Client-Merchant Online Payment System Exploiting Visual Cryptography

Abstract

This paper exhibits another methodology for giving restricted data just that is important for asset exchange amid web shopping along these lines defending client information and expanding client certainty and avoiding wholesale fraud. These days rapid thriving in E-Commerce business sector has been seen in late time all through the world. With continually expanding notoriety of internet shopping, Debit or Credit card extortion and individual data security are real attentiveness toward clients, shippers and banks and the principle rationale of this undertaking is to give abnormal state security in ECommerce applications and web shopping. This task minimizes point by point data sharing in the middle of buyer and online dealer yet empower effective asset exchange subsequently defending shopper data and anticipating abuse of data next to merchant. This is accomplished by the presentation of Central Certified Authority (CA) and consolidated utilization of Steganography, Visual Cryptography and Digital Signature for this reason. A fast flourishing in ECommerce business sector has been seen in late time all through the world. With constantly expanding prominence of web shopping, Debit or Credit card extortion and individual data security are real attentiveness toward clients, dealers and banks. The primary thought process of this undertaking is to give abnormal state security in E-Commerce applications and web shopping. This task minimizes definite data sharing in the middle of purchaser and online vendor yet empower effective asset exchange consequently protecting customer data and counteracting abuse of data next to merchant. This is accomplished by the presentation of Central Certified Authority (CA) and joined use of Steganography, Visual Cryptography and Digital Signature for this reason.

Authors and Affiliations

Ganji Sekhar, CH Kodandaram

Keywords

Related Articles

A Survey: Optimization of Backoff Algorithm for Wireless Mobile Adhoc Network

Media access control (MAC) layer is a very important layer in wireless sensor networks. The media access control data communication protocol sub layer also known as the medium access control. It provide addressing an...

Decentralized Probabilistic Text Clustering by using Distributed Hierarchical peer to peer Clustering

Document clustering (or text clustering) is the application of cluster analysis to textual documents. It has applications in automatic document organization, topic extraction and fast information retrieval or filteri...

Design of a System Providing Customizable Content-Based Message filtering for OSN’s

For communication and sharing information, Online Social Networks (OSN’s) are being used by everyone is to give users the capability to organize the messages posted on their own private space to keep away from thesur...

Abrupt Software Cost Estimation Technique Based on Basic Requirement

Software cost estimation is the process to measure the required effort and cost to build system. In the project management still it is one of the most difficult tasks. There is a lack of reliable estimation technique...

Improving GDOP inPseudolite only Navigation System using Genetic Algorithm

Position fix accuracy of Pseudolite only navigation system [1] mainly depends upon minimum achievable GDOP (Geometrical Dilution of precision) by suitable placement of Transmitters. The suitable placement of transmi...

Download PDF file
  • EP ID EP28345
  • DOI -
  • Views 320
  • Downloads 4

How To Cite

Ganji Sekhar, CH Kodandaram (2015). Client-Merchant Online Payment System Exploiting Visual Cryptography. International Journal of Research in Computer and Communication Technology, 4(11), -. https://europub.co.uk/articles/-A-28345