Professional Documents
Culture Documents
2011-2015
Abstract
This paper presents a new approach for providing limited
information only that is necessary for fund transfer during
online shopping thereby safeguarding customer data and
increasing customer confidence and preventing identity theft.
A cryptographic technique based on visual secret sharing used
for image encryption. Using k out of n (k, n) visual secret
sharing scheme a secret image is encrypted in shares which are
meaningless images that can be transmitted or distributed over
an un trusted communication channel. Only combining the k
shares or more give the original secret image. Phishing is an
attempt by an individual or a group to thieve personal
confidential information such as passwords, credit card
information etc from unsuspecting victims for identity theft,
financial gain and other fraudulent activities The use of images
is explored to preserve the privacy of image captcha by
decomposing the original image captcha into two shares that
are stored in separate database servers such that the original
image captcha can be revealed only when both are
simultaneously available; the individual sheet images do not
reveal the identity of the original image captcha. Once the
original image captcha is revealed to the user it can be used as
the password. Several solutions have been proposed to tackle
phishing.
INTRODUCTION
This gives flexibility and freedom from the point view of sentence
construction but it increases computational complexity.
2. Encoding
Representation of each letter in secret message by its equivalent ASCII
code.
Conversion of ASCII code to equivalent 8 bit binary number.
Division of 8 bit binary number into two 4 bit parts.
Choosing of suitable letters from table 1 corresponding to the 4 bit parts.
Meaningful sentence construction by using letters obtained as the first
letters of suitable words.
Encoding is not case sensitive.
3. Decoding Steps
Hardware requirements
Processor - Intel I3
Speed - 1.80 ghz
RAM - 4gb
Storage Disk - 500gb
Software requirements
Platform : Windows 7
Programming Environment: JAVA 6
HttpServer : Tomcat 6
Design : HTML,Jsp,JavaScript.
Server side Script : Java Server Pages.
BackEnd : Oracle 10
UML
Diagrams
Class diagram
User Authenticate
Registration
+uid: integer +uid: integer
+accountno: integer +uname: String
+password: integer +uname: String
+address: String +password: integer
+uid: integer +e_id: String
+uname: String +authenticate()
+signIn()
+register()
TBSteg
+password: integer
+text-c: String
+sentence: String
+encode()
+decode()
Encode
Decode
+ascii: integer
+binary: integer +ascii: integer
+accountno: integer +binary: integer
+accountno: integer
+toBinary()
+toASCII() +toASCII()
+to8bits() +toBinary()
+to4bits() +to4bits()
+numberAssignment() +to8bits()
+numberAssignment()
Steg Shares
Kum,
TBSteg
Deukkyu
+password: ******
Lee,Encode
Jangwoo Lee,
Decode
Minkyu
+ascii: 7 +ascii: 7
+binary: 0111 +binary: 0111
+accountno: 12345666 +accountno: 12345666
Bae, Rankyoung
Shares
Lim,Steg
Heejin
+share1: 12345666
+text: 010110100 +share2: *******
Component Diagram
<<component>>
User <<component>>
<<component>>
Registration Authenticate
<<component>>
TBSeg
<<component>>
<<component>> Decode
Encode
<<component>> <<component>>
Steg Shares
Deployment Diagram
TBSteg
Encode Decode
steg Shares
Usecase Diagram
authenticate
Merchant
register user given some details to merchant
accountno
User
tbsteg CA
split
merge
result
bank
Interaction Diagram
1.Sequence Diagram
Decode Steg Shares
User Registration Authenticate TBSeg Encode
1 : signIn()
2 : register()
3 : authenticate()
4 : encode() 5 : toBinary()
6 : to8bit()
7 : to4bit()
8 : decode()
9 : to4bit()
10 : to8bit()
11 : extract()
12 : merge()
13 : result()
2.Collaboration Diagram
1 : register() 2 : authenticate()
Registration User Authentication
3 : convert()
TBSteg
7 : to8Bit()
4 : to8Bit()
5 : toASCII() 8 : toASCCI()
Decode
Encode
9 : to4Bit()
6 : to4Bit()
11 : extract()
10 : extract()
12 : split()
Shares
Steg
13 : merge()
Statechart Diagram
user give accountno & some details to the merchant
User authenticate Merchant
TBSeg
image
CA
where mechant give accountno to the CA
Bank
result
Activity Diagram
merchant CA
User
yes
user authentication password
TBSteg
no