Client-Merchant Online Payment System Exploiting Visual Cryptography

Abstract

This paper exhibits another methodology for giving restricted data just that is important for asset exchange amid web shopping along these lines defending client information and expanding client certainty and avoiding wholesale fraud. These days rapid thriving in E-Commerce business sector has been seen in late time all through the world. With continually expanding notoriety of internet shopping, Debit or Credit card extortion and individual data security are real attentiveness toward clients, shippers and banks and the principle rationale of this undertaking is to give abnormal state security in ECommerce applications and web shopping. This task minimizes point by point data sharing in the middle of buyer and online dealer yet empower effective asset exchange subsequently defending shopper data and anticipating abuse of data next to merchant. This is accomplished by the presentation of Central Certified Authority (CA) and consolidated utilization of Steganography, Visual Cryptography and Digital Signature for this reason. A fast flourishing in ECommerce business sector has been seen in late time all through the world. With constantly expanding prominence of web shopping, Debit or Credit card extortion and individual data security are real attentiveness toward clients, dealers and banks. The primary thought process of this undertaking is to give abnormal state security in E-Commerce applications and web shopping. This task minimizes definite data sharing in the middle of purchaser and online vendor yet empower effective asset exchange consequently protecting customer data and counteracting abuse of data next to merchant. This is accomplished by the presentation of Central Certified Authority (CA) and joined use of Steganography, Visual Cryptography and Digital Signature for this reason.

Authors and Affiliations

Ganji Sekhar, CH Kodandaram

Keywords

Related Articles

Minimum Bandwidth Reservations for Periodic Streams in Wireless Real-Time Systems

Reservation-based (as opposed to contention-based) channel access in WLANs provides predictable and deterministic transmission and is therefore able to provide timeliness guarantees for wireless and embedded real-ti...

Double Compression Of JPEG Image Using DWT Over RDWT

Reconstruction of the history of an image is a difficult process with visual document analysis. Suppose, if an image undergo double compression, then the compressed image is not the exact bit stream generated by the...

A Study on Tactics Used to Incorporate Medical Informatics and Automated Diagnostic Methods

Drastic changes have taken place in medicine over the last century. Physicians were faced with the difficulty of making diagnoses with little information that are not sufficient, often resorting to exploratory surger...

Design of Proximity Coupled Patch Antenna for Miniaturization and Directivity Enhancement

A thorough investigation of microstrip patch antenna performance in presence of superstrate layer has been presented in this paper. Superstrate improves directivity and reduces resonant frequencies. The proximity cou...

Improvisation of Identity, Trustworthiness and Privacy in Social Network

The expanding notoriety of informal community administrations (SNS), being utilized by a great many individuals ordinary, has emerged some security and protection issues. While clients must be allowed to pick which m...

Download PDF file
  • EP ID EP28345
  • DOI -
  • Views 333
  • Downloads 4

How To Cite

Ganji Sekhar, CH Kodandaram (2015). Client-Merchant Online Payment System Exploiting Visual Cryptography. International Journal of Research in Computer and Communication Technology, 4(11), -. https://europub.co.uk/articles/-A-28345