cyber crime and security - irjmets

8
e-ISSN: 2582-5208 International Research Journal of Modernization in Engineering Technology and Science ( Peer-Reviewed, Open Access, Fully Refereed International Journal ) Volume:04/Issue:06/June-2022 Impact Factor- 6.752 www.irjmets.com www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science [3121] CYBER CRIME AND SECURITY Mr. Siddesh Prabhakar Gite *1 , Mr. Omprakash Laxmanappa Mandge *2 *1 Student, Institute Of Computer Science, Mumbai Educational Trust-MET ICS, Mumbai, India. *2 Course Co-Ordinator Institute Of Computer Science, Mumbai Educational Trust- MET ICS, Mumbai, India. ABSTRACT A humongous improvement in E-Commerce marketplace is visible with inside the complete world. Due to which Debit, Credit card and private statistics protection are the maximum crucial factors for clients and banks. In this method it's miles crucial to offer best constrained statistics this is essential for cash switch for the duration of on-line purchasing therefore protective an person’s facts and growing their religion and obviate identification robbery. This fee gadget uses integrate steganography and visible cryptography. This venture uses an unique picture that is further divided into stocks which might be saved in separate database servers. By the use of K out of N (K, N) a mystery picture is encrypted that are trivial images. Only through combining K percentage with N percentage makes the picture meaningful; an person a part of the unique picture does now no longer display the identification of the unique picture. Once the unique picture is found out to the consumer it could be used because the password. Keywords: Introduction, IT Act 2000 and 2008 Steganography, Visual Cryptography, Survey Analysis. I. INTRODUCTION CYBER CRIME Cybercrime is described as against the law wherein a laptop acts as an item of the crime (hacking, phishing, spamming) or used as a device to dedicate an illegal act (infant pornography, hate crimes). Cybercriminals use laptop generation to get entry to private statistics, commercial enterprise change confidentials or use the net for exploitation or malicious purposes. Criminals who carry out those unlawful sports are regularly called hackers. Types of cyber crime are DoS Attacks, Botnets, Identity Theft, Cyberstalking, Phishing, Prohibited/Illegal Content, Online Scams. Some sorts are as follows: 1.1.1 INTERNET FRAUD Whenever someone attempts to buy a product from the net, he/she is on a brilliant chance of being victimized through net fraud. So, it's miles crucial for someone to investigate and look at the reassets from which he/she is buying the product. The e-trade surroundings is complete of faux agencies and businesses who distribute worst exceptional merchandise to the clients and are substantially worried in stealing clients financial institution account details. 1.1.2 CYBERBULLYING Cyberbullying is accomplished via virtual gadgets like Cell Phones, iPhone, Ipads, Computers, Tablets, etc. Mentally torturing, harassing or Humiliating a person is referred as cyberbullying. It consists of sending, posting or sharing offensive and sexual content material "publicly" or sending it to a selected person. The content material may also include private facts like pictures, e mail, chats etc. 1.1.3 PHISHING SCAMS This is an try to collect customers password and touchy statistics through producing and disguising a faux website of an genuine website. When a consumer comes throughout such sort of faux website he/she can be able to enter his/her private facts with inside the sign up or sign on shape ensuing the leakage of the facts. Cyber Criminals : Someone who penetrates and breaks the safety gadget of an organization or a community and exploits the failings with inside the laptop gadget is called Hacker and procedure is called Hacking. There are many varieties of hackers. Script Kiddie, White Hat Hackers, Grey Hat Hackers, Black Hat Hackers. In January, newshounds with the Tribune News Service paid 500 rupees for login credentials to a provider being supplied through nameless dealers over WhatsApp. Using the provider, the newshounds may want to input any Aadhaar range, a 12-digit precise identifier assigned to each Indian citizen. Doing so might retrieve

Upload: khangminh22

Post on 24-Apr-2023

0 views

Category:

Documents


0 download

TRANSCRIPT

e-ISSN: 2582-5208 International Research Journal of Modernization in Engineering Technology and Science

( Peer-Reviewed, Open Access, Fully Refereed International Journal )

Volume:04/Issue:06/June-2022 Impact Factor- 6.752 www.irjmets.com

www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science

[3121]

CYBER CRIME AND SECURITY Mr. Siddesh Prabhakar Gite*1, Mr. Omprakash Laxmanappa Mandge*2

*1Student, Institute Of Computer Science, Mumbai Educational Trust-MET ICS, Mumbai, India.

*2Course Co-Ordinator Institute Of Computer Science, Mumbai Educational

Trust- MET ICS, Mumbai, India.

ABSTRACT

A humongous improvement in E-Commerce marketplace is visible with inside the complete world. Due to

which Debit, Credit card and private statistics protection are the maximum crucial factors for clients and banks.

In this method it's miles crucial to offer best constrained statistics this is essential for cash switch for the

duration of on-line purchasing therefore protective an person’s facts and growing their religion and obviate

identification robbery. This fee gadget uses integrate steganography and visible cryptography. This venture

uses an unique picture that is further divided into stocks which might be saved in separate database servers.

By the use of K out of N (K, N) a mystery picture is encrypted that are trivial images. Only through combining K

percentage with N percentage makes the picture meaningful; an person a part of the unique picture does now

no longer display the identification of the unique picture. Once the unique picture is found out to the consumer

it could be used because the password.

Keywords: Introduction, IT Act 2000 and 2008 Steganography, Visual Cryptography, Survey Analysis.

I. INTRODUCTION

CYBER CRIME

Cybercrime is described as against the law wherein a laptop acts as an item of the crime (hacking, phishing,

spamming) or used as a device to dedicate an illegal act (infant pornography, hate crimes). Cybercriminals use

laptop generation to get entry to private statistics, commercial enterprise change confidentials or use the net

for exploitation or malicious purposes. Criminals who carry out those unlawful sports are regularly called

hackers. Types of cyber crime are DoS Attacks, Botnets, Identity Theft, Cyberstalking, Phishing,

Prohibited/Illegal Content, Online Scams. Some sorts are as follows:

1.1.1 INTERNET FRAUD

Whenever someone attempts to buy a product from the net, he/she is on a brilliant chance of being victimized

through net fraud. So, it's miles crucial for someone to investigate and look at the reassets from which he/she is

buying the product. The e-trade surroundings is complete of faux agencies and businesses who distribute worst

exceptional merchandise to the clients and are substantially worried in stealing clients financial institution

account details.

1.1.2 CYBERBULLYING

Cyberbullying is accomplished via virtual gadgets like Cell Phones, iPhone, Ipads, Computers, Tablets, etc.

Mentally torturing, harassing or Humiliating a person is referred as cyberbullying. It consists of sending,

posting or sharing offensive and sexual content material "publicly" or sending it to a selected person. The

content material may also include private facts like pictures, e mail, chats etc.

1.1.3 PHISHING SCAMS

This is an try to collect customers password and touchy statistics through producing and disguising a faux

website of an genuine website. When a consumer comes throughout such sort of faux website he/she can be

able to enter his/her private facts with inside the sign up or sign on shape ensuing the leakage of the facts.

Cyber Criminals : Someone who penetrates and breaks the safety gadget of an organization or a community and

exploits the failings with inside the laptop gadget is called Hacker and procedure is called Hacking. There are

many varieties of hackers. Script Kiddie, White Hat Hackers, Grey Hat Hackers, Black Hat Hackers.

In January, newshounds with the Tribune News Service paid 500 rupees for login credentials to a provider

being supplied through nameless dealers over WhatsApp. Using the provider, the newshounds may want to

input any Aadhaar range, a 12-digit precise identifier assigned to each Indian citizen. Doing so might retrieve

e-ISSN: 2582-5208 International Research Journal of Modernization in Engineering Technology and Science

( Peer-Reviewed, Open Access, Fully Refereed International Journal )

Volume:04/Issue:06/June-2022 Impact Factor- 6.752 www.irjmets.com

www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science

[3122]

severe varieties of statistics at the queried citizen saved through UIDAI (Unique Identification Authority of

India). Those bits of facts protected name, deal with, photo, tele cell smartphone range and e mail deal with. An

extra fee of three hundred rupees to the dealers yielded get entry to to software program via which all and

sundry may want to print an ID card for any Aadhaar range. The facts breach is assumed to have compromised

the private statistics of all 1.1 billion residents registered in India.

II. IT (INFORMATION TECHNOLOGY) ACT 2000 AND 2008

2.1 IT ACT 2000

The Information Technology Act, 2000 (which is likewise called ITA-2000, or the IT Act) is an Act of the Indian

Parliament notified on 17 October 2000. It is the number one regulation in India dealing with cybercrime and

digital trade. It is primarily based totally at the United Nations Model Law on Electronic Commerce 1996

endorsed through the General Assembly of United Nations through a decision dated 30 January 1997.

The unique Act contained ninety four sections, divided in thirteen chapters and four schedules. The legal

guidelines follow to the complete of India. Persons of different nationalities also can be indicted beneath Neath

the regulation, if the crime includes a laptop or community positioned in India. The Act offers felony framework

for digital governance through giving reputation to digital records and virtual signatures. The formations of

Controller of Certifying Authorities became directed through the Act, to adjust issuing of virtual signatures. It

additionally defines cyber crimes and prescribed consequences for them.

2.2 IT ACT 2008

The Information Technology Amendment Act, 2008 (IT Act 2008) is a significant addition to India's Information

Technology Act (ITA-2000). The IT Amendment Act became exceeded through the Indian Parliament in October

2008 and got here into pressure a yr. later.

The unique Act became advanced to sell the IT industry, adjust e-trade, facilitate e-governance and save you

cybercrime. The Act additionally sought to foster protection practices inside India that might serve the united

states in a worldwide context. The Amendment became created to deal with problems that the unique invoice

did not cowl and to house in addition improvement of IT and associated protection worries for the reason that

unique regulation became exceeded.

III. STEGANOGRAPHY AND VISUAL CRYPTOGRAPHY

To keep away from cyber crime numerous measures were taken. These degree may also range on a massive

scale. In order to offer protection over the net 2 strategies are getting used that are said as follows:

We are the use of an Indian root method that is a textual content primarily based totally steganography. A very

antique and Indian Vedic Numeric code method is cited gift the textual content primarily based totally

steganography. In this approach English alphabets letters frequency is used with Indian Vedic Numeric Code. In

this example we aren't giving any unique significance to the vowels in addition to consonants.

Fig: Table of letter frequency and range venture.

e-ISSN: 2582-5208 International Research Journal of Modernization in Engineering Technology and Science

( Peer-Reviewed, Open Access, Fully Refereed International Journal )

Volume:04/Issue:06/June-2022 Impact Factor- 6.752 www.irjmets.com

www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science

[3123]

3.1 Algorithm for Steganography the use of ASCII Code

Encoding Steps:

1. Take enter from consumer with inside the shape of textual content.

2. Each letter represents its ASCII code.

3. The ASCII code may be represented in eight bit binary range.

4. This eight bit range is in addition divided into components four bit each.

5. five Every a part of this range may be assigned with zero to F hex code.

3.2 Results:

1) Secret Password = shivani.

2) Convert it into eight bit ASCII code :

three) eight bit binary range is then divided into four bits components:

s= 01110011, h= 01101000, i= 01101001, v=01110110,

a= 01100001, n= 01101110, i= 01101001.

four) Now , four bit binary may be in variety of zero to 15.

For eg : 0111= 7, 0011= three, 0110= 6, 1000= eight,

0110= 6,

1001= nine, 0111=7, 0110= 6, 0110= 6, 0001= 1, 0110=6,

1110=D, 0110= 6, 1001= nine.

five) Perform phrase venture from table:

NUMBER WORD NUMBER WORD

zero HI eight ARE

1 DEAR nine YOU

2 HOW A SAD

three CAT B DAUGHTER

four PRINCESS C DOG

five PLAN D COME

6 TO E HEAVEN

7 MY F GOD

7= MY,three= CAT,6= TO, eight= ARE, 6= TO, nine= YOU, 7= MY,

6= TO, 6= TO, 1= DEAR, 6= TO, D= COME,

6= TO, nine= YOU.

6) Encrypted Password= MY CAT TO ARE TO YOU MY TO DEAR TO COME TO YOU.

NUMBER WORD NUMBER WORD

0 HI 8 ARE

1 DEAR 9 YOU

2 HOW A SAD

3 CAT B DAUGHTER

4 PRINCESS C DOG

5 PLAN D COME

6 TO E HEAVEN

7 MY F GOD

e-ISSN: 2582-5208 International Research Journal of Modernization in Engineering Technology and Science

( Peer-Reviewed, Open Access, Fully Refereed International Journal )

Volume:04/Issue:06/June-2022 Impact Factor- 6.752 www.irjmets.com

www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science

[3124]

3.3 Algorithm for visible cryptography:

Suppose in (2, 2) Visual Cryptography i.e 2 OUT OF 2 Visual Cryptography scheme, our mystery picture may be

divided into stocks. The unique picture will best be reconstructed through stacking those stocks. No statistics

may be rebuild through any unmarried percentage. These stocks may be published on transparencies. During

decryption this stocks may be stacked and mystery picture may be envisage through our bare eyes with none

complicated computation procedure.

e-ISSN: 2582-5208 International Research Journal of Modernization in Engineering Technology and Science

( Peer-Reviewed, Open Access, Fully Refereed International Journal )

Volume:04/Issue:06/June-2022 Impact Factor- 6.752 www.irjmets.com

www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science

[3125]

IV. SURVEY ANALYSIS

e-ISSN: 2582-5208 International Research Journal of Modernization in Engineering Technology and Science

( Peer-Reviewed, Open Access, Fully Refereed International Journal )

Volume:04/Issue:06/June-2022 Impact Factor- 6.752 www.irjmets.com

www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science

[3126]

e-ISSN: 2582-5208 International Research Journal of Modernization in Engineering Technology and Science

( Peer-Reviewed, Open Access, Fully Refereed International Journal )

Volume:04/Issue:06/June-2022 Impact Factor- 6.752 www.irjmets.com

www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science

[3127]

e-ISSN: 2582-5208 International Research Journal of Modernization in Engineering Technology and Science

( Peer-Reviewed, Open Access, Fully Refereed International Journal )

Volume:04/Issue:06/June-2022 Impact Factor- 6.752 www.irjmets.com

www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science

[3128]

V. CONCLUSION

A fee gadget for on-line purchasing is proposed through combining textual content primarily based totally

steganography and visible cryptography that offers client’s facts privateness and forestalls misuse of facts at

merchant’s side. The approach is involved best with prevention of become aware of robbery and client facts

protection. This approach may be implemented for E-Commerce with attention vicinity on fee for the duration

of on-line purchasing in addition to bodily banking.

VI. REFERENCES [1] CyberCrime and Security December 2017 Muhammad Hamza Namal College.

[2] Cyber Crime and Security Soumya Tiwari* , Anshika Bhalla, Ritu Rawat CSE, Graphic Era University,

Dehradun, Uttarakhand, India

[3] Inside of Cyber Crimes and Information Security: Threats and Solutions 1 Sunakshi Maghu*, 2

Siddharth Sehra and 3Avdesh Bhardawaj 1, 2Department of EECE, ITM University, Sector 23 (A),

Gurgaon, Haryana, India 3Department of Applied Sciences, ITM University, Sector 23 (A), Gurgaon,

Haryana, India.

[4] Souvik Roy and P. Venkateswaran ,“Online Payment System the use of Steganography and Visual

Cryptography”,2014 IEEE Students Conference on Electrical, Electronics and Computer Science.

[5] B.Srikanth, G.Padmaja ,Dr. Syed Khasim, Dr. P.V.S.Lakshmi, A.Haritha,“Secured Bank Authentication the

use of Image Processing and Visual Cryptography”, International Journal of Computer Science and

Information Technologies, Vol. five (2),2014, 2432-2437.

[6] S. R. Navale1 , S. S. Khandagale2, R. A. Malpekar3, Prof. N. K.Chouhan4,“Approach for Secure Online

transaction the use of Visual Cryptography Text Steganography”, International Journal of Engineering

Research Technology (IJERT) ISSN: 2278-0181 IJERTV4IS030775 www.ijert.org (This paintings is

certified beneathneath a Creative Commons Attribution four.zero International License.) Vol. four Issue

03, March-2015 894.

[7] SECURE E-PAY USING STEGANOGRAPHY AND VISUAL CRYPTOGRAPHY SARITA SWAMY, RESHMA

GULWANI International Journal of Advanced Computational Engineering and Networking, ISSN: 2320-

2106, Volume-five, Issue-7, Jul.-2017 http://iraj.in.