Securing E-Transaction Using Cryptography & Steganography
Keywords:
Steganography, Cryptography, Advance Encryption Standard(AES), Compression, Decompression.Abstract
In recent time there is rapid growth in E-commerce market throughout the world. Personal information security are major concern for customers and merchants due to increasing popularity of online shopping, debit or credit card fraud and banks specifically in the case of card not present. Identity theft and phishing are the threats of online shopping. This approach helps in safeguarding customer data and increasing customer confidence and preventing identity thief by giving extra level of security. This method uses combined application of Cryptography & Steganography.
References
- European ATM securityonline. Available :http://www.european-atm-security.eu/atm-industry.[accessed:12 November 2014].
- N. Haller, C. Metz, P. Nesser, One-Time password system, RFC 2289, Feb 1998.
- Secure Hash Standard (SHS), FIBS PUB180-4, March 2012.
- D. Eastlake, P. Jones. A US secure hash algorithm 1(SHA1), RFC 3174, September 2001.
- Jihui Chen, Xiaoyao Xie, and Fengxuan Jing, "The Security of shopping online," Proceedings of 2011 International Conference of Electronic & Mechanical Engineering and Information Technology(EMEIT), vol.9,pp.4693-4696,2011.
- Javelin Strategy & Research, "2013 Identify Fraud Report", https://docs.apwg.org/reports/apwg_trends_report_q2_2013.pdf.
- Jack Brassil, Steven Low, Nicholas Maxemchuk, Larry O’Gorman, "Hiding Information in Document Images," Proceeding of 1995 Conference Science & Systems, Johns Hopkins University, pp. 482-489, 1995.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.