SlideShare a Scribd company logo
1 of 37
AN ANTI-COUNTERFEITING
TECHNIQUE FOR CREDIT
CARD TRANSACTION
SYSTEM
Introduction
•CREDI-CRYPT is a technique for hiding sensitive credit card
information in an arbitrary background image without the
sensitive data getting exposed in public domains.
•CREDI-CRYPT combine Cryptographic and Steganographic
technique to provide a reliable security solution for credit card
transactions.
•Both techniques together helps to achieve data confidentiality
and data integrity.
Basic Block Diagram
05/13/14
Credi-Crypt
CryptographyCryptography
SteganographySteganography
UserUser
Final outputFinal output
Implementation
• Cryptographic techniques like Arithmetic coding and
binary code will be used along with Hamming codes as
error detection and correction codes.
• The ‘Customer Name’ will be encoded in binary form
based on alphabetical position of string.
• The obtained number or position is converted to the 6 digit
binary form, so as to keep whole stream of bits always an
even number which will create more ambiguity for
intruder.
• A hamming code word will be generated for every
character in the ‘Customer Name’ string.
• 16 digit unique credit card number in addition to the
significant 3 digit CVV number will be encoded using
Arithmetic encoding,
Implementation(cont)
• After the arithmetic coding process we obtain double
precision values corresponding to the input sequences. We
round these to six significant digits and then convert it to
binary using our encoding algorithm.
• Whole encoded cipher text will be embedded into the pixels
of the image.
• Credi-Crypt proposes an adaptive data hiding technique
joined with the use of optimum pixel adjustment algorithm
to hide data into the integer wavelet coefficients of the cover
image.
• A pseudorandom generator function is used to select the
embedding locations of the integer wavelet coefficients to
increase the system security.
Implementation(cont)
• The OPA(Optimum Pixel Adjustment) algorithm is applied
after embedding secret message.
• For decoding, the receiver must have our decoding algorithm.
In addition to these the symbol probability, symbol set and the
length of the sequence must be known.
Embedding Algorithm
• Step 1: Read the cover image file into a two dimensional
decimal array.
• Step 2: Perform histogram modification by mapping the
lowest 15 grayscale levels to the value of 15 and the highest
15 grayscale levels to the value 240.
• Step 3: Divide the cover image into 8x8 non overlapping
blocks.
• Step 4: Transform each block to the transform domain using
2D Haar integer wavelet transform resulting LLI, LHI, HLI
and HHI.
• The Haar wavelet transform can be written as simple pairwise
averages and differences
S1,n= (S0,2n +S0,2n+1) /2
d1,n = (S0,2n+1- S0,2n )
• It is obvious that the above output may be not integer, the
Haar wavelet transform in above equation can be rewritten
using lifting in two steps to be executed sequentially:
d1,n = (S0,2n+1- S0,2n )
S1,n= (S0,2n+ d1,n /2)
• From the above both equations we can calculate the integer
wavelet transform according to:
d1,n = (S0,2n+1- S0,2n )
S1,n= (S0,2n+ [d1,n /2])
• Then the inverse transform can be calculated by:
S0,2n= (S1,n - [d1,n /2])
S0,2n+1= ( d1,n + S0,2n)
• The 1D Haar Transform can be easily extended to 2D. In the
2D case we first apply the 1D Haar transform on each row. We
take the resultant matrix, and then apply the 1D Haar
transform on each column.
• Step 5: Calculate hiding capacity (L) ]. The length of LSBs of
wavelet coefficients (L) is calculated as:
    k +3, if Co ≥ 2k+3
L= k+2, if 2k+2 ≤ Co < 2k+3
k +1, if 2k +1 ≤ Co < 2k+2
     k, if Co < 2k+1
Where, Co is the absolute value of wavelet coefficients and k
is the minimum length to be used in each coefficient.
• Step 6: Embed L bits of message into the corresponding
randomly chosen coefficients.
• Step 7: Apply optimal pixel adjustment algorithm. The main
idea of using the optimum pixel adjustment (OPA) algorithm
is to minimize the error difference between the original
coefficient value and the altered value by checking the right
next bit to the modified LSBs so that the resulted change will
be minimal.
• For example, if a binary number 1000 (decimal number 8)is
changed to 1111 (decimal number 15) because its three LSB's
were replaced with embedded data; the difference from the
original number is 7. This difference in the original value is
called the embedding error. By adjusting the fourth bit from a
value of I to a value of 0, the binary number now becomes
0111 (decimal number 7) and the embedding error is reduced
to I while at the same time preserving the value of the three
embedded bits.
• Step 8: Calculate the inverse integer wavelet transform on
each 8x8 block to restore the image to spatial domain
Embedding Algorithm
Extraction Algorithm
Example
• Upon pressing “Card No” button, user is prompted to enter
credit card details. Let the entered details be as follows:
Credit card no : 3281 9432 7493 9403
CVV no : 340
Expiry date : 0918
Credit card holder name : Neha D
• After entering these details, user presses “Encoding” button,
which displays the following encoding details:
The output of dt (Hamming code) is: Columns 1 through 15
0 1 0 0 0 0 1 1 1 0 1 0 0 0 0
Columns 16 through 30
0 0 1 0 1 0 0 1 1 0 0 1 0 0 0
Columns 31 through 45
0 1 0 1 0 0 0 0 0 1 1 1 0 1 0
Columns 46 through 50
0 0 1 0 0
Arithmetic Encoding Started
Probability for 3 is 0.22727
Probability for 2 is 0.090909
Probability for 8 is 0.090909
Probability for 1 is 0.090909
Probability for 9 is 0.18182
Probability for 4 is 0.18182
Probability for 7 is 0.045455
Probability for 0 is 0.090909
The tag is 0.059102
The output of cbb (tag word) is: Columns 1 through 15
0 0 0 0 1 1 1 0 0 1 1 0 1 1 0
Columns 16 through 20
1 1 1 1 0
• Upon pressing the “Steganography” button, the user is
prompted to select an image to embed the encoded details.
After selecting the image, encoded details are embedded in
image and stego image is displayed to the user.
• When user presses the “Extract” button, the following output
is displayed:
Arithmetic Decoding Started
The received keyword is 3281943274939403340
• The credit card number and the card holder name are
displayed.
• Along with this, PSNR and MSE are also displayed.
MSE = 0.2194
PSNR = 51.4249
USER INTERFACE
Main Screen
Main Application Screen
Input(Card no) Screen
Input(CVV) No
Encoding Screen
Encoding process output
Steganography Screen
Final Output Screen
 
PSNR = 51.5006 MSE=0.2119
PSNR=51.1234 MSE=0.1968
PSNR =51.9632 MSE = 0.1605
MSE = 0.2190PSNR=51.369
PSNR=51.4975 MSE = 0.2209
MSE =0.2161PSNR = 51.4579
Applications
• Credi-crpyt is a stand-alone application which can be used
tostore credit-card data in a small or medium sized
organization(eg Banks) in a secret way.
• As stored data need not be transferred over the network the
security provided by credi-crypt is sufficient rather than
getting into the complex procedure of SSL.
Further Work
• Further while using this application over network a secret key
can be exchanged between the sender and the reciever to
provide higher level of security.
• The proposed system can be further developed to increase its
robustness by using some sort of error correction code which
increases the probability of retrieving the message after
attacks, also investigating methods to increase visual quality
of the stego-image.

More Related Content

What's hot

Code conversion r006
Code conversion r006Code conversion r006
Code conversion r006arunachalamr16
 
digital logic circuits, digital component floting and fixed point
 digital logic circuits, digital component floting and fixed point digital logic circuits, digital component floting and fixed point
digital logic circuits, digital component floting and fixed pointRai University
 
Data Reprersentation
Data Reprersentation  Data Reprersentation
Data Reprersentation Kamal Acharya
 
Digital Principles-Number systems
Digital Principles-Number systemsDigital Principles-Number systems
Digital Principles-Number systemschandkec
 
BCH CODE AND DECODING BCH
BCH CODE AND DECODING BCHBCH CODE AND DECODING BCH
BCH CODE AND DECODING BCHkhosravanitavana
 
Digital notes
Digital notesDigital notes
Digital notesstivengo2
 
Encoder and decoder
Encoder and decoderEncoder and decoder
Encoder and decoderAbid Ali
 
Chapter 1 digital systems and binary numbers
Chapter 1 digital systems and binary numbersChapter 1 digital systems and binary numbers
Chapter 1 digital systems and binary numbersMohammad Bashartullah
 
Digital Logic Rcs
Digital Logic RcsDigital Logic Rcs
Digital Logic RcsRamzi Alqrainy
 
Ee 202 chapter 1 number and code system
Ee 202 chapter 1 number and code system Ee 202 chapter 1 number and code system
Ee 202 chapter 1 number and code system CT Sabariah Salihin
 
Number systems r002
Number systems  r002Number systems  r002
Number systems r002arunachalamr16
 
Introduction number systems and conversion
 Introduction number systems and conversion Introduction number systems and conversion
Introduction number systems and conversionkanyuma jitjumnong
 
Computers numbering systems
Computers   numbering systemsComputers   numbering systems
Computers numbering systemssld1950
 
CArcMOOC 02.02 - Encodings of numerical sets
CArcMOOC 02.02 - Encodings of numerical setsCArcMOOC 02.02 - Encodings of numerical sets
CArcMOOC 02.02 - Encodings of numerical setsAlessandro Bogliolo
 
Floating point representation
Floating point representationFloating point representation
Floating point representationmissstevenson01
 
Octal to binary encoder
Octal to binary encoderOctal to binary encoder
Octal to binary encoderAjay844
 

What's hot (20)

07Decoders121
07Decoders12107Decoders121
07Decoders121
 
Code conversion r006
Code conversion r006Code conversion r006
Code conversion r006
 
digital logic circuits, digital component floting and fixed point
 digital logic circuits, digital component floting and fixed point digital logic circuits, digital component floting and fixed point
digital logic circuits, digital component floting and fixed point
 
Data Reprersentation
Data Reprersentation  Data Reprersentation
Data Reprersentation
 
Digital Principles-Number systems
Digital Principles-Number systemsDigital Principles-Number systems
Digital Principles-Number systems
 
BCH CODE AND DECODING BCH
BCH CODE AND DECODING BCHBCH CODE AND DECODING BCH
BCH CODE AND DECODING BCH
 
Digital notes
Digital notesDigital notes
Digital notes
 
Encoder and decoder
Encoder and decoderEncoder and decoder
Encoder and decoder
 
Chapter 1 digital systems and binary numbers
Chapter 1 digital systems and binary numbersChapter 1 digital systems and binary numbers
Chapter 1 digital systems and binary numbers
 
Objective Questions Digital Electronics
Objective Questions Digital ElectronicsObjective Questions Digital Electronics
Objective Questions Digital Electronics
 
Codes r005
Codes  r005Codes  r005
Codes r005
 
Digital Logic Rcs
Digital Logic RcsDigital Logic Rcs
Digital Logic Rcs
 
Ee 202 chapter 1 number and code system
Ee 202 chapter 1 number and code system Ee 202 chapter 1 number and code system
Ee 202 chapter 1 number and code system
 
Number systems r002
Number systems  r002Number systems  r002
Number systems r002
 
Introduction number systems and conversion
 Introduction number systems and conversion Introduction number systems and conversion
Introduction number systems and conversion
 
Computers numbering systems
Computers   numbering systemsComputers   numbering systems
Computers numbering systems
 
CArcMOOC 02.02 - Encodings of numerical sets
CArcMOOC 02.02 - Encodings of numerical setsCArcMOOC 02.02 - Encodings of numerical sets
CArcMOOC 02.02 - Encodings of numerical sets
 
Visual Cryptography
Visual CryptographyVisual Cryptography
Visual Cryptography
 
Floating point representation
Floating point representationFloating point representation
Floating point representation
 
Octal to binary encoder
Octal to binary encoderOctal to binary encoder
Octal to binary encoder
 

Similar to project ppt on anti counterfeiting technique for credit card transaction system

A New hybrid method in watermarking using DCT and AES
A New hybrid method in watermarking using DCT and AESA New hybrid method in watermarking using DCT and AES
A New hybrid method in watermarking using DCT and AESIJERD Editor
 
notes_Image Compression_edited.ppt
notes_Image Compression_edited.pptnotes_Image Compression_edited.ppt
notes_Image Compression_edited.pptHarisMasood20
 
Internet of Things_ Securing Data using ASCII Value base Encryption and Image...
Internet of Things_ Securing Data using ASCII Value base Encryption and Image...Internet of Things_ Securing Data using ASCII Value base Encryption and Image...
Internet of Things_ Securing Data using ASCII Value base Encryption and Image...Prosen Ghosh
 
Fingerprint EVM
Fingerprint EVMFingerprint EVM
Fingerprint EVMPranay Raj
 
Aiar. unit v. machine vision 1462642546237
Aiar. unit v. machine vision 1462642546237Aiar. unit v. machine vision 1462642546237
Aiar. unit v. machine vision 1462642546237Kunal mane
 
Cryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSACryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSAaritraranjan
 
Multimedia communication jpeg
Multimedia communication jpegMultimedia communication jpeg
Multimedia communication jpegDr. Kapil Gupta
 
FPGA Based Decimal Matrix Code for Passive RFID Tag
FPGA Based Decimal Matrix Code for Passive RFID TagFPGA Based Decimal Matrix Code for Passive RFID Tag
FPGA Based Decimal Matrix Code for Passive RFID TagIJERA Editor
 
BCH Codes
BCH CodesBCH Codes
BCH CodesAakankshaR
 
Global Wireless E-Voting Documentation
Global Wireless E-Voting DocumentationGlobal Wireless E-Voting Documentation
Global Wireless E-Voting DocumentationCharan Reddy Mutyala
 
Digital logic-formula-notes-final-1
Digital logic-formula-notes-final-1Digital logic-formula-notes-final-1
Digital logic-formula-notes-final-1Kshitij Singh
 
Training Report on embedded Systems and Robotics
Training Report on embedded  Systems and RoboticsTraining Report on embedded  Systems and Robotics
Training Report on embedded Systems and RoboticsNIT Raipur
 
IRJET - Multi-Key Privacy in Cloud Computing
IRJET -  	  Multi-Key Privacy in Cloud ComputingIRJET -  	  Multi-Key Privacy in Cloud Computing
IRJET - Multi-Key Privacy in Cloud ComputingIRJET Journal
 
Source coding
Source codingSource coding
Source codingMOHIT KUMAR
 
11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature mapsAlexander Decker
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansionSreeda Perikamana
 
Hard Decision Viterbi Decoder: Implementation on FPGA and Comparison of Resou...
Hard Decision Viterbi Decoder: Implementation on FPGA and Comparison of Resou...Hard Decision Viterbi Decoder: Implementation on FPGA and Comparison of Resou...
Hard Decision Viterbi Decoder: Implementation on FPGA and Comparison of Resou...IJERA Editor
 

Similar to project ppt on anti counterfeiting technique for credit card transaction system (20)

A New hybrid method in watermarking using DCT and AES
A New hybrid method in watermarking using DCT and AESA New hybrid method in watermarking using DCT and AES
A New hybrid method in watermarking using DCT and AES
 
notes_Image Compression_edited.ppt
notes_Image Compression_edited.pptnotes_Image Compression_edited.ppt
notes_Image Compression_edited.ppt
 
Internet of Things_ Securing Data using ASCII Value base Encryption and Image...
Internet of Things_ Securing Data using ASCII Value base Encryption and Image...Internet of Things_ Securing Data using ASCII Value base Encryption and Image...
Internet of Things_ Securing Data using ASCII Value base Encryption and Image...
 
Fingerprint EVM
Fingerprint EVMFingerprint EVM
Fingerprint EVM
 
Aiar. unit v. machine vision 1462642546237
Aiar. unit v. machine vision 1462642546237Aiar. unit v. machine vision 1462642546237
Aiar. unit v. machine vision 1462642546237
 
Cryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSACryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSA
 
Multimedia communication jpeg
Multimedia communication jpegMultimedia communication jpeg
Multimedia communication jpeg
 
Jpeg compression
Jpeg compressionJpeg compression
Jpeg compression
 
FPGA Based Decimal Matrix Code for Passive RFID Tag
FPGA Based Decimal Matrix Code for Passive RFID TagFPGA Based Decimal Matrix Code for Passive RFID Tag
FPGA Based Decimal Matrix Code for Passive RFID Tag
 
BCH Codes
BCH CodesBCH Codes
BCH Codes
 
Global Wireless E-Voting Documentation
Global Wireless E-Voting DocumentationGlobal Wireless E-Voting Documentation
Global Wireless E-Voting Documentation
 
Digital logic-formula-notes-final-1
Digital logic-formula-notes-final-1Digital logic-formula-notes-final-1
Digital logic-formula-notes-final-1
 
Training Report on embedded Systems and Robotics
Training Report on embedded  Systems and RoboticsTraining Report on embedded  Systems and Robotics
Training Report on embedded Systems and Robotics
 
IRJET - Multi-Key Privacy in Cloud Computing
IRJET -  	  Multi-Key Privacy in Cloud ComputingIRJET -  	  Multi-Key Privacy in Cloud Computing
IRJET - Multi-Key Privacy in Cloud Computing
 
Source coding
Source codingSource coding
Source coding
 
11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
Data compression
Data compressionData compression
Data compression
 
Hard Decision Viterbi Decoder: Implementation on FPGA and Comparison of Resou...
Hard Decision Viterbi Decoder: Implementation on FPGA and Comparison of Resou...Hard Decision Viterbi Decoder: Implementation on FPGA and Comparison of Resou...
Hard Decision Viterbi Decoder: Implementation on FPGA and Comparison of Resou...
 
Introduction to Microcontrollers
Introduction to MicrocontrollersIntroduction to Microcontrollers
Introduction to Microcontrollers
 

Recently uploaded

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Recently uploaded (20)

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

project ppt on anti counterfeiting technique for credit card transaction system

  • 1. AN ANTI-COUNTERFEITING TECHNIQUE FOR CREDIT CARD TRANSACTION SYSTEM
  • 2. Introduction •CREDI-CRYPT is a technique for hiding sensitive credit card information in an arbitrary background image without the sensitive data getting exposed in public domains. •CREDI-CRYPT combine Cryptographic and Steganographic technique to provide a reliable security solution for credit card transactions. •Both techniques together helps to achieve data confidentiality and data integrity.
  • 4. Implementation • Cryptographic techniques like Arithmetic coding and binary code will be used along with Hamming codes as error detection and correction codes. • The ‘Customer Name’ will be encoded in binary form based on alphabetical position of string. • The obtained number or position is converted to the 6 digit binary form, so as to keep whole stream of bits always an even number which will create more ambiguity for intruder. • A hamming code word will be generated for every character in the ‘Customer Name’ string. • 16 digit unique credit card number in addition to the significant 3 digit CVV number will be encoded using Arithmetic encoding,
  • 5. Implementation(cont) • After the arithmetic coding process we obtain double precision values corresponding to the input sequences. We round these to six significant digits and then convert it to binary using our encoding algorithm. • Whole encoded cipher text will be embedded into the pixels of the image. • Credi-Crypt proposes an adaptive data hiding technique joined with the use of optimum pixel adjustment algorithm to hide data into the integer wavelet coefficients of the cover image. • A pseudorandom generator function is used to select the embedding locations of the integer wavelet coefficients to increase the system security.
  • 6. Implementation(cont) • The OPA(Optimum Pixel Adjustment) algorithm is applied after embedding secret message. • For decoding, the receiver must have our decoding algorithm. In addition to these the symbol probability, symbol set and the length of the sequence must be known.
  • 7. Embedding Algorithm • Step 1: Read the cover image file into a two dimensional decimal array. • Step 2: Perform histogram modification by mapping the lowest 15 grayscale levels to the value of 15 and the highest 15 grayscale levels to the value 240. • Step 3: Divide the cover image into 8x8 non overlapping blocks. • Step 4: Transform each block to the transform domain using 2D Haar integer wavelet transform resulting LLI, LHI, HLI and HHI.
  • 8. • The Haar wavelet transform can be written as simple pairwise averages and differences S1,n= (S0,2n +S0,2n+1) /2 d1,n = (S0,2n+1- S0,2n ) • It is obvious that the above output may be not integer, the Haar wavelet transform in above equation can be rewritten using lifting in two steps to be executed sequentially: d1,n = (S0,2n+1- S0,2n ) S1,n= (S0,2n+ d1,n /2)
  • 9. • From the above both equations we can calculate the integer wavelet transform according to: d1,n = (S0,2n+1- S0,2n ) S1,n= (S0,2n+ [d1,n /2]) • Then the inverse transform can be calculated by: S0,2n= (S1,n - [d1,n /2]) S0,2n+1= ( d1,n + S0,2n)
  • 10. • The 1D Haar Transform can be easily extended to 2D. In the 2D case we first apply the 1D Haar transform on each row. We take the resultant matrix, and then apply the 1D Haar transform on each column. • Step 5: Calculate hiding capacity (L) ]. The length of LSBs of wavelet coefficients (L) is calculated as:     k +3, if Co ≥ 2k+3 L= k+2, if 2k+2 ≤ Co < 2k+3 k +1, if 2k +1 ≤ Co < 2k+2      k, if Co < 2k+1 Where, Co is the absolute value of wavelet coefficients and k is the minimum length to be used in each coefficient.
  • 11. • Step 6: Embed L bits of message into the corresponding randomly chosen coefficients. • Step 7: Apply optimal pixel adjustment algorithm. The main idea of using the optimum pixel adjustment (OPA) algorithm is to minimize the error difference between the original coefficient value and the altered value by checking the right next bit to the modified LSBs so that the resulted change will be minimal.
  • 12. • For example, if a binary number 1000 (decimal number 8)is changed to 1111 (decimal number 15) because its three LSB's were replaced with embedded data; the difference from the original number is 7. This difference in the original value is called the embedding error. By adjusting the fourth bit from a value of I to a value of 0, the binary number now becomes 0111 (decimal number 7) and the embedding error is reduced to I while at the same time preserving the value of the three embedded bits. • Step 8: Calculate the inverse integer wavelet transform on each 8x8 block to restore the image to spatial domain
  • 15. Example • Upon pressing “Card No” button, user is prompted to enter credit card details. Let the entered details be as follows: Credit card no : 3281 9432 7493 9403 CVV no : 340 Expiry date : 0918 Credit card holder name : Neha D
  • 16. • After entering these details, user presses “Encoding” button, which displays the following encoding details: The output of dt (Hamming code) is: Columns 1 through 15 0 1 0 0 0 0 1 1 1 0 1 0 0 0 0 Columns 16 through 30 0 0 1 0 1 0 0 1 1 0 0 1 0 0 0 Columns 31 through 45 0 1 0 1 0 0 0 0 0 1 1 1 0 1 0 Columns 46 through 50 0 0 1 0 0
  • 17. Arithmetic Encoding Started Probability for 3 is 0.22727 Probability for 2 is 0.090909 Probability for 8 is 0.090909 Probability for 1 is 0.090909 Probability for 9 is 0.18182 Probability for 4 is 0.18182 Probability for 7 is 0.045455 Probability for 0 is 0.090909 The tag is 0.059102
  • 18. The output of cbb (tag word) is: Columns 1 through 15 0 0 0 0 1 1 1 0 0 1 1 0 1 1 0 Columns 16 through 20 1 1 1 1 0
  • 19. • Upon pressing the “Steganography” button, the user is prompted to select an image to embed the encoded details. After selecting the image, encoded details are embedded in image and stego image is displayed to the user. • When user presses the “Extract” button, the following output is displayed: Arithmetic Decoding Started The received keyword is 3281943274939403340 • The credit card number and the card holder name are displayed.
  • 20. • Along with this, PSNR and MSE are also displayed. MSE = 0.2194 PSNR = 51.4249
  • 32. PSNR =51.9632 MSE = 0.1605
  • 35. MSE =0.2161PSNR = 51.4579
  • 36. Applications • Credi-crpyt is a stand-alone application which can be used tostore credit-card data in a small or medium sized organization(eg Banks) in a secret way. • As stored data need not be transferred over the network the security provided by credi-crypt is sufficient rather than getting into the complex procedure of SSL.
  • 37. Further Work • Further while using this application over network a secret key can be exchanged between the sender and the reciever to provide higher level of security. • The proposed system can be further developed to increase its robustness by using some sort of error correction code which increases the probability of retrieving the message after attacks, also investigating methods to increase visual quality of the stego-image.