{"title":"New approach to online payment system","authors":"Himanshu Joshi, Mohit Patil, Charushila Talekar, Mohmmad Jakir","doi":"10.21090/ijaerd.0303118","DOIUrl":null,"url":null,"abstract":"It is been observed lately that a massive amount of crowd is diverting itself to the most efficient platform i.e. the e-commerce market for personal online shopping. During this process debit cards, credit cards and internet banking facility is regularly used for any purchase of product. This elements involve a lot of confidential data which are necessary to complete the payment but also has many intrusion risks. To avoid this data stealing, to improve the internet security and increase confidentiality of data this method is proposed which uses visual cryptography and steganography to function efficiently.","PeriodicalId":13846,"journal":{"name":"International Journal for Scientific Research and Development","volume":"30 1","pages":"546-547"},"PeriodicalIF":0.0000,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal for Scientific Research and Development","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.21090/ijaerd.0303118","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
It is been observed lately that a massive amount of crowd is diverting itself to the most efficient platform i.e. the e-commerce market for personal online shopping. During this process debit cards, credit cards and internet banking facility is regularly used for any purchase of product. This elements involve a lot of confidential data which are necessary to complete the payment but also has many intrusion risks. To avoid this data stealing, to improve the internet security and increase confidentiality of data this method is proposed which uses visual cryptography and steganography to function efficiently.