Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Software Requirement Specification

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

SOFTWARE REQUIREMENT SPECIFICATION

Online Secure payment system using Steganography and


Cryptography

1. INTRODUCTION :

A high-speed prosperity in E-Commerce market has been witnessed in recent times


throughout the world. With ever increasing popularity of online shopping, Debit or Credit card
fraud and personal information security are major burden for customers, merchants and banks
specifically in the case of CNP (Card Not Present). It allows customers to buy goods or services
using web browsers and by filling credit or debit card information. In online shopping the
common threats are phishing and identity theft. Identity theft is a form of stealing someone's
identity i.e. personal information in which someone pretends to be someone else. The person
misuses personal information for purchasing or for opening bank accounts and arranging credit
cards.

Proposed system presents a new approach for providing limited information only that is
necessary for fund transfer during online shopping thereby shielding customer data and
increasing customer confidence and preventing identity theft. The approach uses combined
application of Steganography and image cryptography for this purpose. User Account Details
such as Account Number, Debit Card Number and Secret Pin Number are hidden into an Image
using Steganography technique and Image is split into two Shares and shares are encrypted. As
Online Shopping Portals are insecure for Customer's Account Details, Customer has to provide
only Account Number on Shopping Portal and Secret details of Bank account are obtained from
merging user image share with Server image share by Admin of Bank.

This system uses both steganography and visual cryptography. It reduces information
sharing between customer and merchant server and safeguards customers information. It enables
successful fund transfer to merchant's account from customer's account and prevents misuse of
information at merchant side.

1.1 PURPOSE :

There some existing systems are available for online secure payment but having some
limitations like:

Supports only one type of image format only,

Does not provide a friendly environment for encrypting or decrypting the data or images.

So to avoid such limitations we are designing this system.

1.2 SCOPE :
 Main scope of the proposed is specially in the online transaction to make a secure
payment.
 It provides facility to the customer to payment by online transaction entering account
detail. we can save the time and money, can secure personal important information such
as account details.
 It provides facility to the customer to payment by online transaction using security
techniques Steganography and cryptography, This system presents a new approach for
providing limited information only that is necessary for fund transfer during online
shopping so, customer data and increasing customer confidence and preventing identity
theft.

1.3 DEFINITION, ACRONYMS, AND ABBREVIATIONS :

 Steganography :
It is the practice of concealing a file, message, image, or video within another file,
message, image, or video. In digital steganography, electronic communications may include
steganographic coding inside of a transport layer, such as a document file, image file, program or
protocol.
 AES algorithm : Advanced Encryption Standard.

 Cryptography :

Cryptography is a method of storing and transmitting data in a particular form so that


only those for whom it is intended can read and process it.Cryptography includes techniques
such as microdots, merging words with images, and other ways to hide information in storage or
transit.

 CNP :Card Not Present.

1.4 TECHNOLOGIES TO BE USED :

 Steganography Algorithm :

It is the practice of hiding secret data into an Image. The advantage of steganography
over cryptography alone is that the intended secret message does not attract attention to itself as
an object of scrutiny. Plainly visible encrypted messages—no matter how unbreakable—arouse
interest, and may in themselves be incriminating in countries where encryption is illegal.
Steganography includes the concealment of information within computer files.

 Advanced Encryption Standard (AES) Algorithm:

The Advanced Encryption Standard or AES is a symmetric block cipher used by the U.S.
government to protect classified information and is implemented in software and hardware
throughout the world to encrypt sensitive data.

The features of AES are as follows :

• Symmetric key symmetric block cipher

• 128-bit data, 128/192/256-bit keys


• Stronger and faster than Triple-DES

• Provide full specification and design details

• Software implementable in C and Java.

AES algorithm is used to encrypt the data. AES comprises three block ciphers, AES-128,
AES-192 and AES-256. Each cipher encrypts and decrypts data in blocks of 128 bits using
cryptographic keys of 128-, 192- and 256-bits, respectively. Symmetric or secret-key ciphers use
the same key for encrypting and decrypting, so both the sender and the receiver must know and
use the same secret key.

2. OVERALL DESCRIPTION :

2.1 PRODUCT PERSPECTIVE :


•Increasing popularity of online shopping, Debit or Credit card fraud and personal
information security are a major burden for customers, merchants, and banks. To reduce
such frauds and increase information security we are designing this system.
•With the help of this system, we can save time and maintain security for fund transfer.
The system gives all the information about the e-shopping to provide better service for
the customer. It provides facility to the customer to pay by online transaction entering
account details, It provides the facility to the customers who want to shop online and
online payment due to lack of time.
•Usage of Steganography ensures that the CA does not know the customer authentication
password thus maintaining customer privacy. Cryptography technique is used for image
encryption, which is useful for verification and validation of user.
•System provides strong security to Customers of Online Shopping using Stenography
technique.

2.2 REQUIREMENT SPECIFICATION :


• SOFTWARE REQUIREMENTS :
1) Eclipse Kepler
2) Apache Tomcat Server 7
3) JDK 1.7

2.3 PRODUCT FUNCTION :


• Registration :
The user has to register on Online Payment Portal. The user has to provide his/her
Account details of any Bank and these details are stored into Banks Server Database.
User Account Details such as Account Number, Debit Card Number, and Secret Pin
Number are hidden into an Image using Steganography technique. The image is split into
two Shares (part of an image) and Shares are encrypted using AES algorithm. One
Cryptographic share is sent on User's Gmail Address and another Share is stored on
Server.
• Once Registration is complete, the user can do Online Shopping on Shopping
Page and select an Item for purchasing.Once an item is selected, the user is redirected on
for Money Transfer. For Money transfer, the user has to provide Account Number and
Cryptographic share for authentication.Request for Money Transfer is sent to Admin of
Respective Bank.
• Admin after logging in to Portal can see Money Transfer requests from users of
Bank.Admin verifies customer by merging provided cryptographic share with Server
stored image share and after getting the full image, it is compared with the original
image.
• If Customer is authentic then Admin can confirm payment of user for an Item.
• As Online Shopping Portals are insecure for Customer's Account Details,
Customer has to provide only Account Number on Shopping Portal and Secret details of
Bank account are obtained from merging user share with Server share by Admin of Bank.

3. USER CHARACTERISTICS :
1) Registration Page: User Account details are taken through this interface.
2) Admin Login Page: Admin Credentials are taken.

3) Cryptographic Share upload form.

4) Online Shopping Items Selection Page.

4. CONSTRAINTS :
After Steganography is applied on an image, Visual Cryptography does not preserve data
hidden inside an image. Therefore, AES Cryptography should be used after splitting image for
security of image shares.

5. ARCHITECTURAL DIAGRAM :
6. REFERENCES :
1. Online Payment System using Steganography and Visual Cryptography
http://www.slideshare.net/shakastechnologies/online-payment-system-using-steganography-
and
2. Combine Use of Steganography and Visual Cryptography for Online Payment System
http://www.ijcaonline.org/research/volume124/number6/reddy-2015-ijca-905494.pdf

3. Online Payment System using Steganography and Visual Cryptography


http://www.ijltemas.in/DigitalLibrary/Vol.4Issue10/94-96.pdf

You might also like