Securing E-Transaction Using Cryptography & Steganography

Authors

  • Awanika Welpulwar  Department of CSE, RTMNU/KDK's SRMCEW, Nagpur, Maharashtra, India
  • Pranali Kalambe  Department of CSE, RTMNU/KDK's SRMCEW, Nagpur, Maharashtra, India
  • Puja Bhute  Department of CSE, RTMNU/KDK's SRMCEW, Nagpur, Maharashtra, India
  • Swati Ramteke  Assistant Professor, Department of CSE, RTMNU/KDK's SRMCEW, Nagpur, Maharashtra, India

Keywords:

Steganography, Cryptography, Advance Encryption Standard(AES), Compression, Decompression.

Abstract

In recent time there is rapid growth in E-commerce market throughout the world. Personal information security are major concern for customers and merchants due to increasing popularity of online shopping, debit or credit card fraud and banks specifically in the case of card not present. Identity theft and phishing are the threats of online shopping. This approach helps in safeguarding customer data and increasing customer confidence and preventing identity thief by giving extra level of security. This method uses combined application of Cryptography & Steganography.

References

  1. European ATM securityonline. Available :http://www.european-atm-security.eu/atm-industry.[accessed:12 November 2014].
  2. N. Haller, C. Metz, P. Nesser, One-Time password system, RFC 2289, Feb 1998.
  3. Secure Hash Standard (SHS), FIBS PUB180-4, March 2012.
  4. D. Eastlake, P. Jones. A US secure hash algorithm 1(SHA1), RFC 3174, September 2001.
  5. Jihui Chen, Xiaoyao Xie, and Fengxuan Jing, "The Security of shopping online," Proceedings of 2011 International Conference of Electronic & Mechanical Engineering and Information Technology(EMEIT), vol.9,pp.4693-4696,2011.
  6. Javelin Strategy & Research, "2013 Identify Fraud Report", https://docs.apwg.org/reports/apwg_trends_report_q2_2013.pdf.
  7. Jack Brassil, Steven Low, Nicholas Maxemchuk, Larry O’Gorman, "Hiding Information in Document Images," Proceeding of 1995 Conference Science & Systems, Johns Hopkins University, pp. 482-489, 1995.

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
Awanika Welpulwar, Pranali Kalambe, Puja Bhute, Swati Ramteke, " Securing E-Transaction Using Cryptography & Steganography, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 4, Issue 4, pp.556-559, March-April-2018.