Software Requirement Specification
Software Requirement Specification
Software Requirement Specification
1. INTRODUCTION :
Proposed system presents a new approach for providing limited information only that is
necessary for fund transfer during online shopping thereby shielding customer data and
increasing customer confidence and preventing identity theft. The approach uses combined
application of Steganography and image cryptography for this purpose. User Account Details
such as Account Number, Debit Card Number and Secret Pin Number are hidden into an Image
using Steganography technique and Image is split into two Shares and shares are encrypted. As
Online Shopping Portals are insecure for Customer's Account Details, Customer has to provide
only Account Number on Shopping Portal and Secret details of Bank account are obtained from
merging user image share with Server image share by Admin of Bank.
This system uses both steganography and visual cryptography. It reduces information
sharing between customer and merchant server and safeguards customers information. It enables
successful fund transfer to merchant's account from customer's account and prevents misuse of
information at merchant side.
1.1 PURPOSE :
There some existing systems are available for online secure payment but having some
limitations like:
Does not provide a friendly environment for encrypting or decrypting the data or images.
1.2 SCOPE :
Main scope of the proposed is specially in the online transaction to make a secure
payment.
It provides facility to the customer to payment by online transaction entering account
detail. we can save the time and money, can secure personal important information such
as account details.
It provides facility to the customer to payment by online transaction using security
techniques Steganography and cryptography, This system presents a new approach for
providing limited information only that is necessary for fund transfer during online
shopping so, customer data and increasing customer confidence and preventing identity
theft.
Steganography :
It is the practice of concealing a file, message, image, or video within another file,
message, image, or video. In digital steganography, electronic communications may include
steganographic coding inside of a transport layer, such as a document file, image file, program or
protocol.
AES algorithm : Advanced Encryption Standard.
Cryptography :
Steganography Algorithm :
It is the practice of hiding secret data into an Image. The advantage of steganography
over cryptography alone is that the intended secret message does not attract attention to itself as
an object of scrutiny. Plainly visible encrypted messages—no matter how unbreakable—arouse
interest, and may in themselves be incriminating in countries where encryption is illegal.
Steganography includes the concealment of information within computer files.
The Advanced Encryption Standard or AES is a symmetric block cipher used by the U.S.
government to protect classified information and is implemented in software and hardware
throughout the world to encrypt sensitive data.
AES algorithm is used to encrypt the data. AES comprises three block ciphers, AES-128,
AES-192 and AES-256. Each cipher encrypts and decrypts data in blocks of 128 bits using
cryptographic keys of 128-, 192- and 256-bits, respectively. Symmetric or secret-key ciphers use
the same key for encrypting and decrypting, so both the sender and the receiver must know and
use the same secret key.
2. OVERALL DESCRIPTION :
3. USER CHARACTERISTICS :
1) Registration Page: User Account details are taken through this interface.
2) Admin Login Page: Admin Credentials are taken.
4. CONSTRAINTS :
After Steganography is applied on an image, Visual Cryptography does not preserve data
hidden inside an image. Therefore, AES Cryptography should be used after splitting image for
security of image shares.
5. ARCHITECTURAL DIAGRAM :
6. REFERENCES :
1. Online Payment System using Steganography and Visual Cryptography
http://www.slideshare.net/shakastechnologies/online-payment-system-using-steganography-
and
2. Combine Use of Steganography and Visual Cryptography for Online Payment System
http://www.ijcaonline.org/research/volume124/number6/reddy-2015-ijca-905494.pdf