Client-Merchant Online Payment System Exploiting Visual Cryptography

Abstract

This paper exhibits another methodology for giving restricted data just that is important for asset exchange amid web shopping along these lines defending client information and expanding client certainty and avoiding wholesale fraud. These days rapid thriving in E-Commerce business sector has been seen in late time all through the world. With continually expanding notoriety of internet shopping, Debit or Credit card extortion and individual data security are real attentiveness toward clients, shippers and banks and the principle rationale of this undertaking is to give abnormal state security in ECommerce applications and web shopping. This task minimizes point by point data sharing in the middle of buyer and online dealer yet empower effective asset exchange subsequently defending shopper data and anticipating abuse of data next to merchant. This is accomplished by the presentation of Central Certified Authority (CA) and consolidated utilization of Steganography, Visual Cryptography and Digital Signature for this reason. A fast flourishing in ECommerce business sector has been seen in late time all through the world. With constantly expanding prominence of web shopping, Debit or Credit card extortion and individual data security are real attentiveness toward clients, dealers and banks. The primary thought process of this undertaking is to give abnormal state security in E-Commerce applications and web shopping. This task minimizes definite data sharing in the middle of purchaser and online vendor yet empower effective asset exchange consequently protecting customer data and counteracting abuse of data next to merchant. This is accomplished by the presentation of Central Certified Authority (CA) and joined use of Steganography, Visual Cryptography and Digital Signature for this reason.

Authors and Affiliations

Ganji Sekhar, CH Kodandaram

Keywords

Related Articles

Cooperative Caching Strategy For Provisioning Cost Minimization In Social Wireless Networks(Swnet’s)

Social Wireless Networks are formed by mobile devices such as data enabled phones, electronic book readers etc., allocating common interests in electronic content and physically gathering together in public places. E...

Unauthorized Data Access Detection by Insertion of Duplicate Data Records

Data distributor gives the access the important data to some trusted agents (third parties), but some of the data is leaked and found with unauthorized persons. Due to this reason data accessing in a secure way is be...

Empowering the Privacy in Online Social Networks

Security is one of the converges that develops when correspondence get interceded in Online Social Networks (OSN) distinctive protection issues have been risen in the online interpersonal organization ,this paper cla...

ACHIEVING ZERO FALSE POSITIVE AND FALSE NEGATIVE RATES IN AN ATTACK-PATH RECONSTRUCTION

The security and privacy are two essential components for the system security of the Computer Networks. Data security means the data is securely stored , transferred and traced IP.Data privacy means the data can only...

A Novel Approach for Text Dependent Speaker Recognition

In recent times, person authentication in security systems using biometric technologies has grown rapidly. The voice is a signal of infinite information. Digital signal processes such as Feature Extraction and Feature...

Download PDF file
  • EP ID EP28345
  • DOI -
  • Views 327
  • Downloads 4

How To Cite

Ganji Sekhar, CH Kodandaram (2015). Client-Merchant Online Payment System Exploiting Visual Cryptography. International Journal of Research in Computer and Communication Technology, 4(11), -. https://europub.co.uk/articles/-A-28345