Client-Merchant Online Payment System Exploiting Visual Cryptography
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 11
Abstract
This paper exhibits another methodology for giving restricted data just that is important for asset exchange amid web shopping along these lines defending client information and expanding client certainty and avoiding wholesale fraud. These days rapid thriving in E-Commerce business sector has been seen in late time all through the world. With continually expanding notoriety of internet shopping, Debit or Credit card extortion and individual data security are real attentiveness toward clients, shippers and banks and the principle rationale of this undertaking is to give abnormal state security in ECommerce applications and web shopping. This task minimizes point by point data sharing in the middle of buyer and online dealer yet empower effective asset exchange subsequently defending shopper data and anticipating abuse of data next to merchant. This is accomplished by the presentation of Central Certified Authority (CA) and consolidated utilization of Steganography, Visual Cryptography and Digital Signature for this reason. A fast flourishing in ECommerce business sector has been seen in late time all through the world. With constantly expanding prominence of web shopping, Debit or Credit card extortion and individual data security are real attentiveness toward clients, dealers and banks. The primary thought process of this undertaking is to give abnormal state security in E-Commerce applications and web shopping. This task minimizes definite data sharing in the middle of purchaser and online vendor yet empower effective asset exchange consequently protecting customer data and counteracting abuse of data next to merchant. This is accomplished by the presentation of Central Certified Authority (CA) and joined use of Steganography, Visual Cryptography and Digital Signature for this reason.
Authors and Affiliations
Ganji Sekhar, CH Kodandaram
Cooperative Caching Strategy For Provisioning Cost Minimization In Social Wireless Networks(Swnet’s)
Social Wireless Networks are formed by mobile devices such as data enabled phones, electronic book readers etc., allocating common interests in electronic content and physically gathering together in public places. E...
Unauthorized Data Access Detection by Insertion of Duplicate Data Records
Data distributor gives the access the important data to some trusted agents (third parties), but some of the data is leaked and found with unauthorized persons. Due to this reason data accessing in a secure way is be...
Empowering the Privacy in Online Social Networks
Security is one of the converges that develops when correspondence get interceded in Online Social Networks (OSN) distinctive protection issues have been risen in the online interpersonal organization ,this paper cla...
ACHIEVING ZERO FALSE POSITIVE AND FALSE NEGATIVE RATES IN AN ATTACK-PATH RECONSTRUCTION
The security and privacy are two essential components for the system security of the Computer Networks. Data security means the data is securely stored , transferred and traced IP.Data privacy means the data can only...
A Novel Approach for Text Dependent Speaker Recognition
In recent times, person authentication in security systems using biometric technologies has grown rapidly. The voice is a signal of infinite information. Digital signal processes such as Feature Extraction and Feature...