SlideShare a Scribd company logo
Steganography Using Reversible Texture Synthesis
ABSTRACT
 We propose a novel approach for steganography using a
reversible texture synthesis. A texture synthesis process re-samples
a smaller texture image which synthesizes a new texture image
with a similar local appearance and arbitrary size.
 We weave the texture synthesis process into steganography to
conceal secret messages. In contrast to using an existing cover
image to hide messages, our algorithm conceals the source texture
image and embeds secret messages through the process of texture
synthesis. This allows us to extract secret messages and the source
texture from a stego synthetic texture.
 Our approach offers three distinct advantages. First, our scheme
offers the embedding capacity that is proportional to the size of the
stego texture image. Second, a steganalytic algorithm is not likely
to defeat our steganographic approach. Third, the reversible
capability inherited from our scheme provides functionality which
allows recovery of the source texture.
Head office: 3nd
floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
 Experimental results have verified that our proposed algorithm
can provide various numbers of embedding capacities, produce a
visually plausible texture images, and recover the source texture.
 EXISTING SYSTEM
• In contrast to using an existing cover image to hide messages, our
algorithm conceals the source texture image and embeds secret
messages through the process of texture synthesis.
• A typical steganographic application includes covert
communications between two parties whose existence is unknown
to a possible attacker and whose success depends on detecting the
existence of this communication
• Most image steganographic algorithms adopt an existing image as a
cover medium. The expense of embedding secret messages into this
cover image is the image distortion encountered in the stego image.
• No significant visual difference exists between the two stego
synthetic textures and the pure synthetic texture.
Head office: 3nd
floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
PROPOSED SYSTEM
• Experimental results have verified that our proposed algorithm can
provide various numbers of embedding capacities, produce a visually
plausible texture images, and recover the source texture.
• proposed an image reversible data hiding algorithm which can recover the
cover image without any distortion from the stego image after the hidden
data have been extracted.
• We illustrate our proposed method in this section. First, we will define
some basic terminology to be used in our algorithm. The basic unit used
for our steganographic texture synthesis is referred to as a “patch.”
• The three fundamental differences between our proposed message-
oriented texture synthesis and the conventional patch-based texture
synthesis are described in Table I. The first difference is the shape of the
overlapped area.
Head office: 3nd
floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
• We believe our proposed scheme offers substantial benefits and provides
an opportunity to extend steganographic applications.
PROPOSED SYSTEM ALGORITHMS
 A large number of image steganographic algorithms have been
investigated with the increasing popularity and use of digital images
ADVANTAGES
Our approach offers three distinct advantages. First, our scheme
offers the embedding capacity that is proportional to the size of the
stego texture image. Second, a steganalytic algorithm is not likely to
defeat our steganographic approach. Third, the reversible capability
Head office: 3nd
floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
inherited from our scheme provides functionality which allows recovery
of the source texture.
System Architecture
ALGORITHM:
 Image steganalytic algorithm
 pixel-based algorithm
Head office: 3nd
floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
MODULE DESCRIPTION
 Steganography Process,
 Encoding,
 Decoding Steps,
 Transaction Online Shopping,
 Customer Authentication,
 Certification Authority Access,
 Final Authenticated Information Results.
Stegnography Process:
In this module, Steganography uses characteristics of English
language such as inflexion, fixed word order and use of periphrases for
hiding data rather than using properties of a sentence. This gives
Head office: 3nd
floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
flexibility and freedom from the point view of sentence construction but
it increases computational complexity.
Encoding:
• Representation of each letter in secret message by its equivalent ASCII
code.
• Conversion of ASCII code to equivalent 8 bit binary number.
• Division of 8 bit binary number into two 4 bit parts.
• Choosing of suitable letters from table 1 corresponding to the 4 bit
parts.
• Meaningful sentence construction by using letters obtained as the first
letters of suitable words.
• Encoding is not case sensitive.
Decoding Steps:
Head office: 3nd
floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
• First letter in each word of cover message is taken and represented by
corresponding 4 bit number.
• 4 bit binary numbers of combined to obtain 8 bit number.
• ASCII codes are obtained from 8 bit numbers.
• Finally secret message is recovered from ASCII codes.
Transaction Online Shopping:
In this module traditional online shopping consumer selects items from
online shopping portal and then is directed to the payment page. Online
merchant may have its own payment system or can take advantage of third
party payment systems such as PayPal, pay online system, Web Money and
others. In the payment portal consumer submit his or her credit or debit card
details such as credit or debit card number, name on the card, expiry date of
the card.
Customer Authentication:
Head office: 3nd
floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
Customer unique authentication password in connection to the bank is
hidden inside a cover text using the text based Steganography method.
Customer authentication information (account no) in connection with
merchant is placed above the cover text in its original form. Now a snapshot
of two texts is taken. From the snapshot image, two shares are generated using
visual cryptography. Now one share is kept by the customer and the other
share is kept in the database of the certified authority.
Certification Authority Access:
During shopping online, after selection of desired item and adding it to
the cart, preferred payment system of the merchant directs the customer to
the Certified Authority portal. In the portal, shopper submits its own share
and merchant submits its own account details. Now the CA combines its own
share with shopper’s share and obtains the original image. From CA now,
merchant account details, cover text are sent to the bank where customer
authentication password is recovered from the cover text.
Final Authenticated Information Results:
Customer authentication information is sent to the merchant by CA.
Upon receiving customer authentication password, bank matches it with its
own database and after verifying legitimate customer, transfers fund from the
customer account to the submitted merchant account. After receiving the
Head office: 3nd
floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
fund, merchant’s payment system validates receipt of payment using
customer authentication information.
New Technology
Ajax toolkit
Stored procedures
javascript
Jquery
Css
Telerik
SYSTEM SPECIFICATION
Hardware Requirements:
 System : Pentium IV 2.4 GHz.
 Hard Disk : 40 GB.
 Floppy Drive : 1.44 Mb.
 Monitor : 14’ Colour Monitor.
 Mouse : Optical Mouse.
 Ram : 512 Mb.
Head office: 3nd
floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
Software Requirements:
 Operating system : Windows 7 Ultimate.
 Coding Language : ASP.Net with C#
 Front-End : Visual Studio 2010 Professional.
 Data Base : SQL Server 2008.
Head office: 3nd
floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457

More Related Content

DOCX
Steganography using reversible texture synthesis
PDF
Steganography using reversible texture synthesis
PPTX
Texture Synthesis
PDF
Steganography Using Reversible Texture Synthesis
PDF
Lsb steganography with improved
PDF
A Survey of Image Based Steganography
PDF
A novel secure image steganography method based on chaos theory in spatial do...
PDF
Steganalysis of LSB Embedded Images Using Gray Level Co-Occurrence Matrix
Steganography using reversible texture synthesis
Steganography using reversible texture synthesis
Texture Synthesis
Steganography Using Reversible Texture Synthesis
Lsb steganography with improved
A Survey of Image Based Steganography
A novel secure image steganography method based on chaos theory in spatial do...
Steganalysis of LSB Embedded Images Using Gray Level Co-Occurrence Matrix

What's hot (19)

PDF
Adaptive block-based pixel value differencing steganography
PPTX
Scene Text Detection on Images using Cellular Automata
PPTX
Modifications in lsb based steganography
DOCX
Image forgery detection using adaptive over segmentation and feature point ma...
PDF
A1804010105
PDF
Hk3312911294
PDF
M ESH S IMPLIFICATION V IA A V OLUME C OST M EASURE
PDF
Adaptive data hiding in edge areas of images with spatial lsb domain systems
PDF
AN IMPROVED MULTI-SOM ALGORITHM
PDF
Digital Media Steganography
PDF
Analysis of image steganalysis techniques to defend against statistical attac...
PPTX
Handwritten and Machine Printed Text Separation in Document Images using the ...
PDF
Robust foreground modelling to segment and detect multiple moving objects in ...
PPTX
Text extraction from natural scene image, a survey
PPT
Steganalysis of lsb matching steganography
PDF
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
PDF
A0360109
PDF
Improved LSB Steganograhy Technique for grayscale and RGB images
PDF
Objects Clustering of Movie Using Graph Mining Technique
Adaptive block-based pixel value differencing steganography
Scene Text Detection on Images using Cellular Automata
Modifications in lsb based steganography
Image forgery detection using adaptive over segmentation and feature point ma...
A1804010105
Hk3312911294
M ESH S IMPLIFICATION V IA A V OLUME C OST M EASURE
Adaptive data hiding in edge areas of images with spatial lsb domain systems
AN IMPROVED MULTI-SOM ALGORITHM
Digital Media Steganography
Analysis of image steganalysis techniques to defend against statistical attac...
Handwritten and Machine Printed Text Separation in Document Images using the ...
Robust foreground modelling to segment and detect multiple moving objects in ...
Text extraction from natural scene image, a survey
Steganalysis of lsb matching steganography
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
A0360109
Improved LSB Steganograhy Technique for grayscale and RGB images
Objects Clustering of Movie Using Graph Mining Technique
Ad

Viewers also liked (12)

PPTX
PPT steganography
DOC
Steganography ProjectReport
PPTX
Steganography and watermarking
PPTX
Steganography
PPT
Image Steganography
PPTX
Steganography Project
PDF
An Image Steganography Algorithm Using Huffman and Interpixel Difference Enco...
PPTX
“Multimedia Steganography with Cipher Text and Compression ppt.
PDF
96683234 project-report-steganography
PPTX
PDF
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
PDF
Steganography Project
PPT steganography
Steganography ProjectReport
Steganography and watermarking
Steganography
Image Steganography
Steganography Project
An Image Steganography Algorithm Using Huffman and Interpixel Difference Enco...
“Multimedia Steganography with Cipher Text and Compression ppt.
96683234 project-report-steganography
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
Steganography Project
Ad

Similar to Steganography using reversible texture synthesis (20)

PPTX
Online paymentusingsteganographt&Visualcryptography
DOCX
Identity based encryption with outsourced revocation in cloud computing
PDF
Jyoti_Triyar_Resume1
DOCX
Control cloud data access privilege and anonymity with fully anonymous attrib...
PPTX
Project PPT sem 2.pptx
PDF
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
DOCX
Public integrity auditing for shared dynamic cloud data with group user revoc...
PDF
Credit card fraud detection through machine learning
PDF
Analysis on Fraud Detection Mechanisms Using Machine Learning Techniques
PDF
ONLINE PAYMENT SYSTEM WITH PHISHING AND DDOS DETECTION AND PREVENTION
PDF
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
PDF
C132733
PDF
ATM for visually challenged people
PPTX
online payment system using Steganography and Visual cryptography
PDF
SMS hashing system (Real-Time) for the reliability of financial transactions
DOCX
Shoulder surfing resistant graphical
PDF
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
PDF
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
PDF
Paper id 25201447
PDF
R04405103106
Online paymentusingsteganographt&Visualcryptography
Identity based encryption with outsourced revocation in cloud computing
Jyoti_Triyar_Resume1
Control cloud data access privilege and anonymity with fully anonymous attrib...
Project PPT sem 2.pptx
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
Public integrity auditing for shared dynamic cloud data with group user revoc...
Credit card fraud detection through machine learning
Analysis on Fraud Detection Mechanisms Using Machine Learning Techniques
ONLINE PAYMENT SYSTEM WITH PHISHING AND DDOS DETECTION AND PREVENTION
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
C132733
ATM for visually challenged people
online payment system using Steganography and Visual cryptography
SMS hashing system (Real-Time) for the reliability of financial transactions
Shoulder surfing resistant graphical
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
Paper id 25201447
R04405103106

More from Pvrtechnologies Nellore (20)

DOCX
A High Throughput List Decoder Architecture for Polar Codes
DOCX
Performance/Power Space Exploration for Binary64 Division Units
DOCX
Hybrid LUT/Multiplexer FPGA Logic Architectures
DOCX
Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...
DOCX
2016 2017 ieee matlab project titles
DOCX
2016 2017 ieee vlsi project titles
DOCX
2016 2017 ieee ece embedded- project titles
DOCX
A High-Speed FPGA Implementation of an RSD-Based ECC Processor
DOCX
6On Efficient Retiming of Fixed-Point Circuits
DOCX
Pre encoded multipliers based on non-redundant radix-4 signed-digit encoding
DOCX
Quality of-protection-driven data forwarding for intermittently connected wir...
DOC
11.online library management system
DOC
06.e voting system
DOCX
New web based projects list
DOCX
Power controlled medium access control
DOCX
IEEE PROJECTS LIST
DOCX
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
DOCX
Cloud keybank privacy and owner authorization
DOCX
Circuit ciphertext policy attribute-based hybrid encryption with verifiable
DOCX
Closeness through-microaggregation-strict-privacy-with-enhanced-utility-prese...
A High Throughput List Decoder Architecture for Polar Codes
Performance/Power Space Exploration for Binary64 Division Units
Hybrid LUT/Multiplexer FPGA Logic Architectures
Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...
2016 2017 ieee matlab project titles
2016 2017 ieee vlsi project titles
2016 2017 ieee ece embedded- project titles
A High-Speed FPGA Implementation of an RSD-Based ECC Processor
6On Efficient Retiming of Fixed-Point Circuits
Pre encoded multipliers based on non-redundant radix-4 signed-digit encoding
Quality of-protection-driven data forwarding for intermittently connected wir...
11.online library management system
06.e voting system
New web based projects list
Power controlled medium access control
IEEE PROJECTS LIST
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Cloud keybank privacy and owner authorization
Circuit ciphertext policy attribute-based hybrid encryption with verifiable
Closeness through-microaggregation-strict-privacy-with-enhanced-utility-prese...

Recently uploaded (20)

PDF
Approach and Philosophy of On baking technology
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Big Data Technologies - Introduction.pptx
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Machine Learning_overview_presentation.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
1. Introduction to Computer Programming.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Tartificialntelligence_presentation.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
Approach and Philosophy of On baking technology
Building Integrated photovoltaic BIPV_UPV.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Per capita expenditure prediction using model stacking based on satellite ima...
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Big Data Technologies - Introduction.pptx
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Programs and apps: productivity, graphics, security and other tools
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Diabetes mellitus diagnosis method based random forest with bat algorithm
Machine Learning_overview_presentation.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
1. Introduction to Computer Programming.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Tartificialntelligence_presentation.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf

Steganography using reversible texture synthesis

  • 1. Steganography Using Reversible Texture Synthesis ABSTRACT  We propose a novel approach for steganography using a reversible texture synthesis. A texture synthesis process re-samples a smaller texture image which synthesizes a new texture image with a similar local appearance and arbitrary size.  We weave the texture synthesis process into steganography to conceal secret messages. In contrast to using an existing cover image to hide messages, our algorithm conceals the source texture image and embeds secret messages through the process of texture synthesis. This allows us to extract secret messages and the source texture from a stego synthetic texture.  Our approach offers three distinct advantages. First, our scheme offers the embedding capacity that is proportional to the size of the stego texture image. Second, a steganalytic algorithm is not likely to defeat our steganographic approach. Third, the reversible capability inherited from our scheme provides functionality which allows recovery of the source texture. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
  • 2.  Experimental results have verified that our proposed algorithm can provide various numbers of embedding capacities, produce a visually plausible texture images, and recover the source texture.  EXISTING SYSTEM • In contrast to using an existing cover image to hide messages, our algorithm conceals the source texture image and embeds secret messages through the process of texture synthesis. • A typical steganographic application includes covert communications between two parties whose existence is unknown to a possible attacker and whose success depends on detecting the existence of this communication • Most image steganographic algorithms adopt an existing image as a cover medium. The expense of embedding secret messages into this cover image is the image distortion encountered in the stego image. • No significant visual difference exists between the two stego synthetic textures and the pure synthetic texture. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
  • 3. PROPOSED SYSTEM • Experimental results have verified that our proposed algorithm can provide various numbers of embedding capacities, produce a visually plausible texture images, and recover the source texture. • proposed an image reversible data hiding algorithm which can recover the cover image without any distortion from the stego image after the hidden data have been extracted. • We illustrate our proposed method in this section. First, we will define some basic terminology to be used in our algorithm. The basic unit used for our steganographic texture synthesis is referred to as a “patch.” • The three fundamental differences between our proposed message- oriented texture synthesis and the conventional patch-based texture synthesis are described in Table I. The first difference is the shape of the overlapped area. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
  • 4. • We believe our proposed scheme offers substantial benefits and provides an opportunity to extend steganographic applications. PROPOSED SYSTEM ALGORITHMS  A large number of image steganographic algorithms have been investigated with the increasing popularity and use of digital images ADVANTAGES Our approach offers three distinct advantages. First, our scheme offers the embedding capacity that is proportional to the size of the stego texture image. Second, a steganalytic algorithm is not likely to defeat our steganographic approach. Third, the reversible capability Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
  • 5. inherited from our scheme provides functionality which allows recovery of the source texture. System Architecture ALGORITHM:  Image steganalytic algorithm  pixel-based algorithm Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
  • 6. MODULE DESCRIPTION  Steganography Process,  Encoding,  Decoding Steps,  Transaction Online Shopping,  Customer Authentication,  Certification Authority Access,  Final Authenticated Information Results. Stegnography Process: In this module, Steganography uses characteristics of English language such as inflexion, fixed word order and use of periphrases for hiding data rather than using properties of a sentence. This gives Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
  • 7. flexibility and freedom from the point view of sentence construction but it increases computational complexity. Encoding: • Representation of each letter in secret message by its equivalent ASCII code. • Conversion of ASCII code to equivalent 8 bit binary number. • Division of 8 bit binary number into two 4 bit parts. • Choosing of suitable letters from table 1 corresponding to the 4 bit parts. • Meaningful sentence construction by using letters obtained as the first letters of suitable words. • Encoding is not case sensitive. Decoding Steps: Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
  • 8. • First letter in each word of cover message is taken and represented by corresponding 4 bit number. • 4 bit binary numbers of combined to obtain 8 bit number. • ASCII codes are obtained from 8 bit numbers. • Finally secret message is recovered from ASCII codes. Transaction Online Shopping: In this module traditional online shopping consumer selects items from online shopping portal and then is directed to the payment page. Online merchant may have its own payment system or can take advantage of third party payment systems such as PayPal, pay online system, Web Money and others. In the payment portal consumer submit his or her credit or debit card details such as credit or debit card number, name on the card, expiry date of the card. Customer Authentication: Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
  • 9. Customer unique authentication password in connection to the bank is hidden inside a cover text using the text based Steganography method. Customer authentication information (account no) in connection with merchant is placed above the cover text in its original form. Now a snapshot of two texts is taken. From the snapshot image, two shares are generated using visual cryptography. Now one share is kept by the customer and the other share is kept in the database of the certified authority. Certification Authority Access: During shopping online, after selection of desired item and adding it to the cart, preferred payment system of the merchant directs the customer to the Certified Authority portal. In the portal, shopper submits its own share and merchant submits its own account details. Now the CA combines its own share with shopper’s share and obtains the original image. From CA now, merchant account details, cover text are sent to the bank where customer authentication password is recovered from the cover text. Final Authenticated Information Results: Customer authentication information is sent to the merchant by CA. Upon receiving customer authentication password, bank matches it with its own database and after verifying legitimate customer, transfers fund from the customer account to the submitted merchant account. After receiving the Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
  • 10. fund, merchant’s payment system validates receipt of payment using customer authentication information. New Technology Ajax toolkit Stored procedures javascript Jquery Css Telerik SYSTEM SPECIFICATION Hardware Requirements:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 14’ Colour Monitor.  Mouse : Optical Mouse.  Ram : 512 Mb. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
  • 11. Software Requirements:  Operating system : Windows 7 Ultimate.  Coding Language : ASP.Net with C#  Front-End : Visual Studio 2010 Professional.  Data Base : SQL Server 2008. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457