28-08-2012, 11:40 AM
IMPROVING MOBILE BANKING SECURITY USING STEGANOGRAPHY
IMPROVING MOBILE BANKING.pdf (Size: 2.75 MB / Downloads: 188)
ABSTRACT
Improving Mobile Banking Security Using Steganography
Upon development of m-commerce as one of the new branches of e- commerce, m-banking has
emerged as one of the main divisions of m-commerce. As the m-banking was received very well, it has
embarked upon supply of various services based on different systems and with the aid of various services
such as the Short Messaging Service (SMS). However, in spite of its advantages, m-banking is facing some
challenges as well. One of these challenges is the issue of security of this system. This paper presents a
method for increasing security of the information requested by users with the use of Steganography
method. In this method, instead of direct sending of the information, it is hidden in a picture by the
password. Then the address of the picture is sent to the user. After entering the password, the user can
witness the information extracted from the picture if the password is entered correctly. This project is
written in J2ME language (Java 2 Micro Edition) and has been implemented on Nokia mobile phones,
models N71 and 6680.
In this method, the information is never placed on the internet and exchanged on plain form. Thus,
the possibility of disclosure of information is very low. No user password is exchanged between the server
and the mobile phone. Therefore there is no risk of disclosure of user password. In this method, the amount
of information exchanged between user and the banking system decreases, so the responding speed of the
bank system increases. Steganography is a relatively modem method in secret exchange of information.
Therefore, the possibility of disclosure and extraction of its information esp. in mobile phones is much
lower.
INTRODUCTION
MOTIVATION
The Growing Importance of Mobile Content
Music, games and video have become principal sources of online
entertainment content in the consumer market, but the discrete systems used to deliver
that content to end devices such as mobile handsets are still rather rudimentary. To
deliver content to the consumer or business, and to adapt to rapidly changing market
needs and trends, device-independent content delivered over multiple channels is
needed—and the content must be coupled with a digital rights management (DRM)
system to allow content owners to monetize their intellectual property.
At the current stage in the evolution of online content, many companies are
focusing on a single part of the value chain, mainly on delivery, and they are able to
gain a competitive advantage there. Because content delivery to a mobile device is
currently a bottleneck, and because it is also not obvious which delivery models are
the best, concentrating on delivery makes sense at the current juncture.
Little attention is paid today, however, to a balanced implementation of the
full value chain. Our research suggests that in a few years time, attention will shift
from discrete systems focusing on delivery of specific content using rudimentary
content management integration to full blown systems that are centered on reusable
content suitable for multi-channel delivery. Adding and using metadata to quickly
find content for a specific user in a specific context and being able to deliver that
content in a timely manner and the correct format is the key to success in this more
mature environment. Whether these types of systems will be owned and managed by
mobile operators or by companies specialized in content (such as publishers or
studios) cannot be predicted at this stage.
LIMITATIONS OF THE PROJECT
Mobile banking application is already in use as many banks are directly launching
their own web sites which an be accessed by the mobiles, but the problem here is the
language which uses in this process is Web Markup Language which eats lot of time
to process and there is no security as there security implementations are pretty
ordinary, this has been overcome by introducing a concept of JAR file developed
using J2ME which directly after installing can get in to contact with the administrator
and also by using a method called Steganography it provides much better security.
EXISTING SYSTEM
In the existing system of the project we had just e-banking that is usage through
computers, here users can bank through the internet from a personal computer located at
a particular point of place or through a mobile which uses WML (Web Markup
Language); it downloads the contents from the internet.
DISADVANTAGES OF EXISTING SYSTEM
As mentioned above we can use both personal computer and the mobile for banking
but the problem here is when we use a personal computer it is required that the person
has to be compulsorily at a place which requires time, he can’t carry his computer with
him where ever he go it is a drawback, to over come with this usage of ecommerce
through mobile has been introduced here we can do banking from any place but the problem here is it completely uses WML for the purpose. When WML is used it
repeatedly has to download every bit of data from the internet which takes a lot of time,
for which mobile E banking by using J2ME has been introduced.
PROPOSED SYSTEM
As the above disadvantages can’t be solved with in this application has been
proposed and also the security will be much improved than the existing system as we are
implementing the special method called Steganography, here in this we develop a jar file
by using J2ME for banking a customer here will get a unique ID & Password once he
dumps the application in to the mobile and after installing he gets the page to get started
with. Here after he enters the ID & Password he gets logged in and he will have an easily
understandable interface where he can have two options i.e. account details and money
transfer. In this process the applications gets interacted not to an internet server but to the
administrator server which makes easy processing and takes no time.
CONCLUSION
This paper presents a method for increasing security of the information requested
by users with the use of steganography method. In this method, instead of direct
sending of the information, it is hidden in a picture by the password. After entering
the password, the user can witness the information extracted from the picture if the
password is entered correctly.