Secure Electronic Payment Methods for Online Shopping Based on Visual Cryptography

Phishing and identity theft are common threats of online shopping. Phishing is an attempt to steal personal data from legitimate user. In this paper we propose a secure e-payment method using a credit card based on visual cryptography. This method adopts the existing 3D-Secure technology. Visual cry...

Full description

Bibliographic Details
Main Authors: Trihastuti Yuniati, Iqsyahiro Kresna A.
Format: Article
Language:Indonesian
Published: Ikatan Ahli Indormatika Indonesia 2020-04-01
Series:Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi)
Subjects:
Online Access:http://jurnal.iaii.or.id/index.php/RESTI/article/view/1732
id doaj-8df803cbe9a5417497f1f2f5651dd5b8
record_format Article
spelling doaj-8df803cbe9a5417497f1f2f5651dd5b82020-11-25T03:03:24ZindIkatan Ahli Indormatika IndonesiaJurnal RESTI (Rekayasa Sistem dan Teknologi Informasi)2580-07602020-04-014231932810.29207/resti.v4i2.17321732Secure Electronic Payment Methods for Online Shopping Based on Visual CryptographyTrihastuti Yuniati0Iqsyahiro Kresna A.1Institut Teknologi Telkom PurwokertoInstitut Teknologi Telkom PurwokertoPhishing and identity theft are common threats of online shopping. Phishing is an attempt to steal personal data from legitimate user. In this paper we propose a secure e-payment method using a credit card based on visual cryptography. This method adopts the existing 3D-Secure technology. Visual cryptography is applied in: user-merchant authentication, user-card provider authentication, user-card issuer authorization. It is applied to captcha image generated by merchant during registration using (2, 2) scheme with 2-subpixel expansion, to a text file containing credit card information sent by merchant to the card provider using (2, 2) scheme with pixel replacement, and to quick response code containing one-time-password that is used to authorize the payment transaction using (2, 2) scheme with 4-subpixel expansion. The test results show that out of 100 trials, all of them give 100% true positive. This indicates that the method is able to prevent phishing and identity theft, in sense of authentication, authorization, confidentiality, and integrity are gained. Phishing can be prevented because only legitimate participant who has an image share. Identity theft can be prevented because credit card details are not stored in the merchant’s database. Authorization is more guaranteed because only authenticated user can authorize the payments.http://jurnal.iaii.or.id/index.php/RESTI/article/view/1732captcha, e-payment, one-time-password, quick response code, visual cryptography
collection DOAJ
language Indonesian
format Article
sources DOAJ
author Trihastuti Yuniati
Iqsyahiro Kresna A.
spellingShingle Trihastuti Yuniati
Iqsyahiro Kresna A.
Secure Electronic Payment Methods for Online Shopping Based on Visual Cryptography
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi)
captcha, e-payment, one-time-password, quick response code, visual cryptography
author_facet Trihastuti Yuniati
Iqsyahiro Kresna A.
author_sort Trihastuti Yuniati
title Secure Electronic Payment Methods for Online Shopping Based on Visual Cryptography
title_short Secure Electronic Payment Methods for Online Shopping Based on Visual Cryptography
title_full Secure Electronic Payment Methods for Online Shopping Based on Visual Cryptography
title_fullStr Secure Electronic Payment Methods for Online Shopping Based on Visual Cryptography
title_full_unstemmed Secure Electronic Payment Methods for Online Shopping Based on Visual Cryptography
title_sort secure electronic payment methods for online shopping based on visual cryptography
publisher Ikatan Ahli Indormatika Indonesia
series Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi)
issn 2580-0760
publishDate 2020-04-01
description Phishing and identity theft are common threats of online shopping. Phishing is an attempt to steal personal data from legitimate user. In this paper we propose a secure e-payment method using a credit card based on visual cryptography. This method adopts the existing 3D-Secure technology. Visual cryptography is applied in: user-merchant authentication, user-card provider authentication, user-card issuer authorization. It is applied to captcha image generated by merchant during registration using (2, 2) scheme with 2-subpixel expansion, to a text file containing credit card information sent by merchant to the card provider using (2, 2) scheme with pixel replacement, and to quick response code containing one-time-password that is used to authorize the payment transaction using (2, 2) scheme with 4-subpixel expansion. The test results show that out of 100 trials, all of them give 100% true positive. This indicates that the method is able to prevent phishing and identity theft, in sense of authentication, authorization, confidentiality, and integrity are gained. Phishing can be prevented because only legitimate participant who has an image share. Identity theft can be prevented because credit card details are not stored in the merchant’s database. Authorization is more guaranteed because only authenticated user can authorize the payments.
topic captcha, e-payment, one-time-password, quick response code, visual cryptography
url http://jurnal.iaii.or.id/index.php/RESTI/article/view/1732
work_keys_str_mv AT trihastutiyuniati secureelectronicpaymentmethodsforonlineshoppingbasedonvisualcryptography
AT iqsyahirokresnaa secureelectronicpaymentmethodsforonlineshoppingbasedonvisualcryptography
_version_ 1724685868737757184