Extended Visual Cryptography and QR code Techniques for Online Fraud Transaction prevention

Authors

  • Gulnaaz Rafiq Pathan Computer Department, AISSMS COE Pune, Maharashtra, India
  • Amey Ravindra Godbole Computer Department, AISSMS COE Pune, Maharashtra, India.
  • Kajal Pramod Chaudhari Computer Department, AISSMS COE Pune, Maharashtra, India
  • Priti Jagannath Pawara Computer Department, AISSMS COE Pune, Maharashtra, India
  • Guided by: Prof. B. R. Quazi Computer Department, AISSMS COE Pune, Maharashtra, India

Keywords:

component; Phishing, visual cryptography, shares, OTP

Abstract

With the advent of internet, various on-line attacks have been increased and among them, the most
well-liked attack is phishing. Phishing is a trial by an individual or a group to get personal confidential information
like passwords, credit information from unsuspecting victims for identity theft, financial gain and different fraudulent
activities, by simulation to be a trustworthy entity. Victims are tricked into providing such data by a combination of
spoofing techniques and social engineering. Visual Cryptography (VC) is used. Visual cryptography is explored to
convert the QR code into two shares and both these shares will then be transmitted separately. One time Passwords
(OTP) is passwords that are valid just for a session to validate the user within a fixed amount of time. Here an image
based mostly authentication using Visual Cryptography is implemented with the combination of OTP (One
Time Password). The use of visual cryptography is explored to preserve the privacy of a picture captcha by moldering
the original image captcha into two shares. the initial image is obtained at the user finish only once both the user
and the server under test are registered with the trusted server.

Published

2018-03-25

How to Cite

Gulnaaz Rafiq Pathan, Amey Ravindra Godbole, Kajal Pramod Chaudhari, Priti Jagannath Pawara, & Guided by: Prof. B. R. Quazi. (2018). Extended Visual Cryptography and QR code Techniques for Online Fraud Transaction prevention. International Journal of Advance Research in Engineering, Science & Technology, 5(3), 5–9. Retrieved from https://ijarest.org/index.php/ijarest/article/view/1163