cyber crime and security - irjmets
TRANSCRIPT
e-ISSN: 2582-5208 International Research Journal of Modernization in Engineering Technology and Science
( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:04/Issue:06/June-2022 Impact Factor- 6.752 www.irjmets.com
www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science
[3121]
CYBER CRIME AND SECURITY Mr. Siddesh Prabhakar Gite*1, Mr. Omprakash Laxmanappa Mandge*2
*1Student, Institute Of Computer Science, Mumbai Educational Trust-MET ICS, Mumbai, India.
*2Course Co-Ordinator Institute Of Computer Science, Mumbai Educational
Trust- MET ICS, Mumbai, India.
ABSTRACT
A humongous improvement in E-Commerce marketplace is visible with inside the complete world. Due to
which Debit, Credit card and private statistics protection are the maximum crucial factors for clients and banks.
In this method it's miles crucial to offer best constrained statistics this is essential for cash switch for the
duration of on-line purchasing therefore protective an person’s facts and growing their religion and obviate
identification robbery. This fee gadget uses integrate steganography and visible cryptography. This venture
uses an unique picture that is further divided into stocks which might be saved in separate database servers.
By the use of K out of N (K, N) a mystery picture is encrypted that are trivial images. Only through combining K
percentage with N percentage makes the picture meaningful; an person a part of the unique picture does now
no longer display the identification of the unique picture. Once the unique picture is found out to the consumer
it could be used because the password.
Keywords: Introduction, IT Act 2000 and 2008 Steganography, Visual Cryptography, Survey Analysis.
I. INTRODUCTION
CYBER CRIME
Cybercrime is described as against the law wherein a laptop acts as an item of the crime (hacking, phishing,
spamming) or used as a device to dedicate an illegal act (infant pornography, hate crimes). Cybercriminals use
laptop generation to get entry to private statistics, commercial enterprise change confidentials or use the net
for exploitation or malicious purposes. Criminals who carry out those unlawful sports are regularly called
hackers. Types of cyber crime are DoS Attacks, Botnets, Identity Theft, Cyberstalking, Phishing,
Prohibited/Illegal Content, Online Scams. Some sorts are as follows:
1.1.1 INTERNET FRAUD
Whenever someone attempts to buy a product from the net, he/she is on a brilliant chance of being victimized
through net fraud. So, it's miles crucial for someone to investigate and look at the reassets from which he/she is
buying the product. The e-trade surroundings is complete of faux agencies and businesses who distribute worst
exceptional merchandise to the clients and are substantially worried in stealing clients financial institution
account details.
1.1.2 CYBERBULLYING
Cyberbullying is accomplished via virtual gadgets like Cell Phones, iPhone, Ipads, Computers, Tablets, etc.
Mentally torturing, harassing or Humiliating a person is referred as cyberbullying. It consists of sending,
posting or sharing offensive and sexual content material "publicly" or sending it to a selected person. The
content material may also include private facts like pictures, e mail, chats etc.
1.1.3 PHISHING SCAMS
This is an try to collect customers password and touchy statistics through producing and disguising a faux
website of an genuine website. When a consumer comes throughout such sort of faux website he/she can be
able to enter his/her private facts with inside the sign up or sign on shape ensuing the leakage of the facts.
Cyber Criminals : Someone who penetrates and breaks the safety gadget of an organization or a community and
exploits the failings with inside the laptop gadget is called Hacker and procedure is called Hacking. There are
many varieties of hackers. Script Kiddie, White Hat Hackers, Grey Hat Hackers, Black Hat Hackers.
In January, newshounds with the Tribune News Service paid 500 rupees for login credentials to a provider
being supplied through nameless dealers over WhatsApp. Using the provider, the newshounds may want to
input any Aadhaar range, a 12-digit precise identifier assigned to each Indian citizen. Doing so might retrieve
e-ISSN: 2582-5208 International Research Journal of Modernization in Engineering Technology and Science
( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:04/Issue:06/June-2022 Impact Factor- 6.752 www.irjmets.com
www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science
[3122]
severe varieties of statistics at the queried citizen saved through UIDAI (Unique Identification Authority of
India). Those bits of facts protected name, deal with, photo, tele cell smartphone range and e mail deal with. An
extra fee of three hundred rupees to the dealers yielded get entry to to software program via which all and
sundry may want to print an ID card for any Aadhaar range. The facts breach is assumed to have compromised
the private statistics of all 1.1 billion residents registered in India.
II. IT (INFORMATION TECHNOLOGY) ACT 2000 AND 2008
2.1 IT ACT 2000
The Information Technology Act, 2000 (which is likewise called ITA-2000, or the IT Act) is an Act of the Indian
Parliament notified on 17 October 2000. It is the number one regulation in India dealing with cybercrime and
digital trade. It is primarily based totally at the United Nations Model Law on Electronic Commerce 1996
endorsed through the General Assembly of United Nations through a decision dated 30 January 1997.
The unique Act contained ninety four sections, divided in thirteen chapters and four schedules. The legal
guidelines follow to the complete of India. Persons of different nationalities also can be indicted beneath Neath
the regulation, if the crime includes a laptop or community positioned in India. The Act offers felony framework
for digital governance through giving reputation to digital records and virtual signatures. The formations of
Controller of Certifying Authorities became directed through the Act, to adjust issuing of virtual signatures. It
additionally defines cyber crimes and prescribed consequences for them.
2.2 IT ACT 2008
The Information Technology Amendment Act, 2008 (IT Act 2008) is a significant addition to India's Information
Technology Act (ITA-2000). The IT Amendment Act became exceeded through the Indian Parliament in October
2008 and got here into pressure a yr. later.
The unique Act became advanced to sell the IT industry, adjust e-trade, facilitate e-governance and save you
cybercrime. The Act additionally sought to foster protection practices inside India that might serve the united
states in a worldwide context. The Amendment became created to deal with problems that the unique invoice
did not cowl and to house in addition improvement of IT and associated protection worries for the reason that
unique regulation became exceeded.
III. STEGANOGRAPHY AND VISUAL CRYPTOGRAPHY
To keep away from cyber crime numerous measures were taken. These degree may also range on a massive
scale. In order to offer protection over the net 2 strategies are getting used that are said as follows:
We are the use of an Indian root method that is a textual content primarily based totally steganography. A very
antique and Indian Vedic Numeric code method is cited gift the textual content primarily based totally
steganography. In this approach English alphabets letters frequency is used with Indian Vedic Numeric Code. In
this example we aren't giving any unique significance to the vowels in addition to consonants.
Fig: Table of letter frequency and range venture.
e-ISSN: 2582-5208 International Research Journal of Modernization in Engineering Technology and Science
( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:04/Issue:06/June-2022 Impact Factor- 6.752 www.irjmets.com
www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science
[3123]
3.1 Algorithm for Steganography the use of ASCII Code
Encoding Steps:
1. Take enter from consumer with inside the shape of textual content.
2. Each letter represents its ASCII code.
3. The ASCII code may be represented in eight bit binary range.
4. This eight bit range is in addition divided into components four bit each.
5. five Every a part of this range may be assigned with zero to F hex code.
3.2 Results:
1) Secret Password = shivani.
2) Convert it into eight bit ASCII code :
three) eight bit binary range is then divided into four bits components:
s= 01110011, h= 01101000, i= 01101001, v=01110110,
a= 01100001, n= 01101110, i= 01101001.
four) Now , four bit binary may be in variety of zero to 15.
For eg : 0111= 7, 0011= three, 0110= 6, 1000= eight,
0110= 6,
1001= nine, 0111=7, 0110= 6, 0110= 6, 0001= 1, 0110=6,
1110=D, 0110= 6, 1001= nine.
five) Perform phrase venture from table:
NUMBER WORD NUMBER WORD
zero HI eight ARE
1 DEAR nine YOU
2 HOW A SAD
three CAT B DAUGHTER
four PRINCESS C DOG
five PLAN D COME
6 TO E HEAVEN
7 MY F GOD
7= MY,three= CAT,6= TO, eight= ARE, 6= TO, nine= YOU, 7= MY,
6= TO, 6= TO, 1= DEAR, 6= TO, D= COME,
6= TO, nine= YOU.
6) Encrypted Password= MY CAT TO ARE TO YOU MY TO DEAR TO COME TO YOU.
NUMBER WORD NUMBER WORD
0 HI 8 ARE
1 DEAR 9 YOU
2 HOW A SAD
3 CAT B DAUGHTER
4 PRINCESS C DOG
5 PLAN D COME
6 TO E HEAVEN
7 MY F GOD
e-ISSN: 2582-5208 International Research Journal of Modernization in Engineering Technology and Science
( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:04/Issue:06/June-2022 Impact Factor- 6.752 www.irjmets.com
www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science
[3124]
3.3 Algorithm for visible cryptography:
Suppose in (2, 2) Visual Cryptography i.e 2 OUT OF 2 Visual Cryptography scheme, our mystery picture may be
divided into stocks. The unique picture will best be reconstructed through stacking those stocks. No statistics
may be rebuild through any unmarried percentage. These stocks may be published on transparencies. During
decryption this stocks may be stacked and mystery picture may be envisage through our bare eyes with none
complicated computation procedure.
e-ISSN: 2582-5208 International Research Journal of Modernization in Engineering Technology and Science
( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:04/Issue:06/June-2022 Impact Factor- 6.752 www.irjmets.com
www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science
[3125]
IV. SURVEY ANALYSIS
e-ISSN: 2582-5208 International Research Journal of Modernization in Engineering Technology and Science
( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:04/Issue:06/June-2022 Impact Factor- 6.752 www.irjmets.com
www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science
[3126]
e-ISSN: 2582-5208 International Research Journal of Modernization in Engineering Technology and Science
( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:04/Issue:06/June-2022 Impact Factor- 6.752 www.irjmets.com
www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science
[3127]
e-ISSN: 2582-5208 International Research Journal of Modernization in Engineering Technology and Science
( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:04/Issue:06/June-2022 Impact Factor- 6.752 www.irjmets.com
www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science
[3128]
V. CONCLUSION
A fee gadget for on-line purchasing is proposed through combining textual content primarily based totally
steganography and visible cryptography that offers client’s facts privateness and forestalls misuse of facts at
merchant’s side. The approach is involved best with prevention of become aware of robbery and client facts
protection. This approach may be implemented for E-Commerce with attention vicinity on fee for the duration
of on-line purchasing in addition to bodily banking.
VI. REFERENCES [1] CyberCrime and Security December 2017 Muhammad Hamza Namal College.
[2] Cyber Crime and Security Soumya Tiwari* , Anshika Bhalla, Ritu Rawat CSE, Graphic Era University,
Dehradun, Uttarakhand, India
[3] Inside of Cyber Crimes and Information Security: Threats and Solutions 1 Sunakshi Maghu*, 2
Siddharth Sehra and 3Avdesh Bhardawaj 1, 2Department of EECE, ITM University, Sector 23 (A),
Gurgaon, Haryana, India 3Department of Applied Sciences, ITM University, Sector 23 (A), Gurgaon,
Haryana, India.
[4] Souvik Roy and P. Venkateswaran ,“Online Payment System the use of Steganography and Visual
Cryptography”,2014 IEEE Students Conference on Electrical, Electronics and Computer Science.
[5] B.Srikanth, G.Padmaja ,Dr. Syed Khasim, Dr. P.V.S.Lakshmi, A.Haritha,“Secured Bank Authentication the
use of Image Processing and Visual Cryptography”, International Journal of Computer Science and
Information Technologies, Vol. five (2),2014, 2432-2437.
[6] S. R. Navale1 , S. S. Khandagale2, R. A. Malpekar3, Prof. N. K.Chouhan4,“Approach for Secure Online
transaction the use of Visual Cryptography Text Steganography”, International Journal of Engineering
Research Technology (IJERT) ISSN: 2278-0181 IJERTV4IS030775 www.ijert.org (This paintings is
certified beneathneath a Creative Commons Attribution four.zero International License.) Vol. four Issue
03, March-2015 894.
[7] SECURE E-PAY USING STEGANOGRAPHY AND VISUAL CRYPTOGRAPHY SARITA SWAMY, RESHMA
GULWANI International Journal of Advanced Computational Engineering and Networking, ISSN: 2320-
2106, Volume-five, Issue-7, Jul.-2017 http://iraj.in.