Client-Merchant Online Payment System Exploiting Visual Cryptography
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 11
Abstract
This paper exhibits another methodology for giving restricted data just that is important for asset exchange amid web shopping along these lines defending client information and expanding client certainty and avoiding wholesale fraud. These days rapid thriving in E-Commerce business sector has been seen in late time all through the world. With continually expanding notoriety of internet shopping, Debit or Credit card extortion and individual data security are real attentiveness toward clients, shippers and banks and the principle rationale of this undertaking is to give abnormal state security in ECommerce applications and web shopping. This task minimizes point by point data sharing in the middle of buyer and online dealer yet empower effective asset exchange subsequently defending shopper data and anticipating abuse of data next to merchant. This is accomplished by the presentation of Central Certified Authority (CA) and consolidated utilization of Steganography, Visual Cryptography and Digital Signature for this reason. A fast flourishing in ECommerce business sector has been seen in late time all through the world. With constantly expanding prominence of web shopping, Debit or Credit card extortion and individual data security are real attentiveness toward clients, dealers and banks. The primary thought process of this undertaking is to give abnormal state security in E-Commerce applications and web shopping. This task minimizes definite data sharing in the middle of purchaser and online vendor yet empower effective asset exchange consequently protecting customer data and counteracting abuse of data next to merchant. This is accomplished by the presentation of Central Certified Authority (CA) and joined use of Steganography, Visual Cryptography and Digital Signature for this reason.
Authors and Affiliations
Ganji Sekhar, CH Kodandaram
EVS: A Cloud Services Information Security and Privacy Eligibility and Verification System
In recent years, cloud computing services have evolved as a new paradigm for delivering computing resources thatare dynamic and customizable, and providehigh performance. Many organizations are migrating their inform...
A method to predict the offloading potential for DTN and WIFI hotspots
An enormous amount of cellular data traffic has been produced by mobile users which exceeds the capacity of cellular network and hence weaken the network quality. The solution is to enhance the capacity of cellular n...
Design of a System Providing Customizable Content-Based Message filtering for OSN’s
For communication and sharing information, Online Social Networks (OSN’s) are being used by everyone is to give users the capability to organize the messages posted on their own private space to keep away from thesur...
A Study of Intrusion Detection Systems in MANETs
In past years, the use of mobile ad hoc networks (MANETs) has been widely spread in many applications, including some mission critical applications, and as such security has become one of the major concerns in MANETs...
Transforming Digital Unstructured and Semi-structured Data into Structured Data with the Aid of IE and KDT
Data growth has seen an exponential acceleration with the advent of computer and network, which have imparted the digital form to data. Data can be classified into three categories: Unstructured data, Semi-structured...