Tunnel based Fund Transfer over the Internet using AES Algorithm

2023 9th International Conference on Smart Structures and Systems (ICSSS)(2023)

引用 0|浏览0
暂无评分
摘要
Online marketing and advertising have expanded quickly as a result of the high-speed networking industry's exponential growth. Deals are offered by internet retailers to both in-person and online shoppers. E-commerce also involves taking precautions against security risks, such as credit card fraud, data breaches, and the disclosure of personal information. This study suggests visual cryptography and steganography as two-way authentication mechanisms to combat e-commerce fraud. In terms of information transfer, identity theft, and authentication, this method offers higher security. Cell wallets are extremely practical and helpful for routine financial transactions, and enhancing their level of security is crucial. The current perspective uses the mobile wallet framework to create digital pockets and a comfortable and convenient m-commerce application for smartphones. The suggested method involves carrying out financial activities via a mobile wallet, such as receiving money, giving money to someone else, paying bills, etc. An encryption key is used to protect the parameters of the transaction when a person chooses an option from their wallet. An identical consultation key and cipher text are received when utilizing the AES-256 method. Depending on the type of transaction the person chooses, the parameters will change. After that, the cloud server receives the obtained encrypted text content, and the fee gateway built into the suggested program facilitates the money transaction. The total effectiveness of the suggested techniques was compared to the effectiveness of the existing strategies. The overall performance of the suggested solution is found to be much improved in terms of operations performance and transaction security after examining various factors.
更多
查看译文
关键词
Visible cryptography,steganography,Mobile Wallet,AES-256,Fee Gateway,Economic Transaction,Phishing,Identity theft
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要