e-Fraud Prevention based on the Self- Authentication of e-Documents
e-Fraud Prevention based on the Self-
Authentication of e-Documents
ABSTRACT
We consider a method for preventing e-Fraud in which a image is encrypted with a floating point cipher using a convolution operation and then output will generate in a image ciphertext. The output is then ‘embedded’ in a host image to hide the encrypted information.Decryption is accomplished by: (i) extracting the binary image from the host image; (ii) correlating the result with the original cipher. In principle, any cipher generator can be used for this purpose and the method has been designed to operate with images.The approach has a variety of applications and in this paper, we focus on the authentication and self-authentication of edocuments (letters and certificates, for example) that are communicated over the Internet and are thereby vulnerable to e-Fraud (e.g. modification, editing, counterfeiting etc.).
EXISTING SYSTEM
The weaknesses of all encryption systems is that the form of the output data (the cipher text), if intercepted, alerts the intruder to the fact that the information being transmitted may have some importance and that it is therefore worth attacking and attempting to decrypt it. This aspect of cipher text transmission can be used to propagate disinformation, achieved by encrypting information that is specifically designed to be intercepted and decrypted. In this case, we assume that the intercept will be attacked, decrypted and the information retrieved. There is no security when transmitting the data from one end to another.
PROPOSED SYSTEM
The main objective of the proposed system is to hide the encrypted message or a secret data in to an image which further act as a carrier of secret data and to transmit to the destination securely without any modification. If there are any perceivable changes when inserting or embedding the information into the image or if any distortions occur in the image or on its resolution there may be a chance for an unauthorized person to modify the data. So, the data encryption into an image and decryption and steganography is used to protect the data from unauthorized person, this plays a major role in the project.The scheme allows for the authentication and selfauthentication of documents such as letters, certificates and other image based data. For example, the self-authentication of edocuments sent as attachments over the internet provides a unique facility for many legal and financial transactions that have traditionally relied on paper based documents to secure authenticity.
Software requirements:
Operating System : Windows
Technology : Java and J2EE
Web Technologies : Html, JavaScript, CSS
IDE : My Eclipse
Web Server : Tomcat
Database : My SQL
Java Version : J2SDK1.5
Hardware requirements:
Hardware – Pentium
Speed – 1.1 GHz
RAM – 1GB
Hard Disk – 20 GB
Floppy Dre – 1.44 MB
KeyBoard – Standard Windows Keyboard
Mouse – Two or Three Button Mouse
Monitor – SVGA
Comments are closed.