CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

E-Banking Security using Cryptography, Steganography and Data Mining

by Namrata Devadiga, Harshad Kothari, Hardik Jain, Smita Sankhe
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 164 - Number 9
Year of Publication: 2017
Authors: Namrata Devadiga, Harshad Kothari, Hardik Jain, Smita Sankhe
10.5120/ijca2017913746

Namrata Devadiga, Harshad Kothari, Hardik Jain, Smita Sankhe . E-Banking Security using Cryptography, Steganography and Data Mining. International Journal of Computer Applications. 164, 9 ( Apr 2017), 26-30. DOI=10.5120/ijca2017913746

@article{ 10.5120/ijca2017913746,
author = { Namrata Devadiga, Harshad Kothari, Hardik Jain, Smita Sankhe },
title = { E-Banking Security using Cryptography, Steganography and Data Mining },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2017 },
volume = { 164 },
number = { 9 },
month = { Apr },
year = { 2017 },
issn = { 0975-8887 },
pages = { 26-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume164/number9/27513-2017913746/ },
doi = { 10.5120/ijca2017913746 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:10:53.377635+05:30
%A Namrata Devadiga
%A Harshad Kothari
%A Hardik Jain
%A Smita Sankhe
%T E-Banking Security using Cryptography, Steganography and Data Mining
%J International Journal of Computer Applications
%@ 0975-8887
%V 164
%N 9
%P 26-30
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The growth of E-Banking has led to an ease of access and 24-hour banking facility for one and all. However, this has led to a rise in e-banking fraud which is a growing problem affecting users around the world. As card is becoming the most prevailing mode of payment for online as well as regular purchase, fraud related with it is also increasing. The drastic upsurge of online banking fraud can be seen as an integrative misuse of social, cyber and physical resources [1]. Thus, the proposed system uses cryptography and steganography technology along with various data mining techniques in order to effectively secure the e-banking process and prevent online fraud.

References
  1. Wei Wei, Jinjiu Li, Longbing, Cao, YumingOu, Jiahang Chen, “Effective detection of sophisticated online banking fraud on extremely imbalanced data”, World Wide Web, July 2013, Vol. 16, Issue 4, pp 449–475.
  2. S. Srilakshmi, “Dual Stegnography Scheme For Secure Data Communication Using Finite State Machine”, International Journal of Advanced Research in Computer Science, Vol. 5, No. 4, April 2014.
  3. Arshia Azam, Rumana Firdous, F. Asma Begum, “High Security Image Steganography Using RSA Algorithm”, Journal of Innovation in Electronics and Communication, Vol 4, July-Dec ’14.
  4. Shimei Wang, Yun Liu, Bo Shen, “MDBSCAN: Multi-level Density Based Spatial Clustering of Applications with Noise”, KMO '16, July 25-28, 2016 ACM, Hagen, Germany.
  5. Naitik P Kamdar, Dipesh G. Kamdar, Dharmesh N. khandhar, “Performance Evaluation of LSB based Steganography for optimization of PSNR and MSE”, Journal of Information, Knowledge and Research in Electronics and Communication Engineering, Vol – 02, Issue – 02.
  6. Rosziati Ibrahim, Teoh Suk Kuan, “Steganography Algorithm to Hide Secret Message inside an Image”, Computer Technology and Application 2, pp.102-108, 2011.
  7. Iyer Aurobind Venkatkumar, Sanatkumar Jayantibhai Kondhol Shardaben, “Comparative study of Data Mining Clustering algorithms”, 2016 IEEE International Conference on Data Science and Engineering.
  8. Bawna Bhat, Abdul Wahid Ali, Apurva Gupta, “DES and AES Performance Evaluation”, International Conference on Computing, Communication and Automation.
  9. S. Anandakumar, “Image Cryptography Using RSA Algorithm in Network Security”, International Journal of Computer Science & Engineering Technology, Vol 5, Issue 9, September 2015.
  10. Andreas Westfeld, “F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis”, I. S. Moskowitz (Ed.): IH 2001, LNCS 2137, pp. 289–302, 2001.
  11. Ali Akbar Hashemi, Navid Daryasafar, “Improving the F5 Steganography Method through Shrinkage Mapping”, International Journal of Scientific & Engineering Research Volume 3, Issue 6, June-2012.
Index Terms

Computer Science
Information Sciences

Keywords

E-Banking Online Banking Fraud Cryptography Steganography Data Mining.