Académique Documents
Professionnel Documents
Culture Documents
Abstract
A rapid growth in E-Commerce market is seen in recent
Existing
Phishing is a criminal mechanism that employs
Cont
However, one must still trust merchant and its
Drawbacks
In result to hide 4 letter word, 8 words are
Proposed System
In the proposed solution, information submitted by the
Advantages
Proposed method minimizes customer information sent TRANSFER
Modules
1.
2.
3.
4.
5.
6.
7.
Steganography Process
Encoding
Decoding Steps:
TRANSACTION IN ONLINE SHOPPING
Customer Authentication
Certification Authority Access
Final Authenticated Information Results
1. Steganography Process
In this module, Steganography uses
2. Encoding
Representation of each letter in secret message by
3. Decoding Steps:
First letter in each word of cover message is
5. Customer Authentication
Customer unique authentication password in
HARDWARE REQUIREMENTS
System
Hard Disk
Monitor
Mouse
Ram
:
:
:
:
:
SOFTWARE REQUIREMENTS
Operating system :
Windows 8 Ultimate
32 BIT
Front End
: Visual Studio 2010
Coding Language : C#.NET
Database
: SQL Server 2008
Architecture
Sequence Diagram
Collaboration Diagram
Conclusion
In this paper, a payment system for online shopping is
BIBLIOGRAPHY
References Made From:
User Interfaces in C#: Windows Forms and Custom Controls by
Matthew MacDonald.
Practical .Net2 and C#2: Harness the Platform, the Language, and
the Framework by Patrick Smacchia.