Skip to main content
Log in

Tele-micropayment scam prevention based on visual secret sharing technique

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Telecommunication micropayment (Tele-micropayment) is an alternative of shelling out from traditional electronic commerce with high flexibility. It has been applied to the applications of online software, music, e-book, and game credit, in which the consumers are only charged with petty expense. The verification procedure of this payment relies on OTP(one time password) via SMS(short message service). Obtaining the OTP from smart phone and importing the content into the website is easy for a consumer to complete the transaction. Nevertheless, the SMS Spam Blocker has brought a fatal damage to Tele-micropayment, which could be spread by malicious smart phone Apps(Applications). With the intercepted SMS, an attacker can further learn the content to launch a micropayment scam. As the amount of micropayment is petty, it is hard to be aware of this behavior after the victim receives the bill. In this proposal, we aim to design a brand-new OTP by introducing visual secret sharing technique. According to the experiments, even the attacker can intercept the SMS to get OTP, he cannot learn the content via OCR(Optical character recognition) software. This has proved that our design can greatly help to stop this micropayment scam.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. ABBYY FineReader 11, URL: http://www.abbyy.com/

  2. Chang CC, Chang SC (2009) “The design of e-traveler’s check with efficiency and mutual authentication,” Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, New York, USA, pp. 309–316

  3. Chang CC, Chang SC, Lee JS (2009) An on-line electronic check system with mutual authentication. Comput Electr Eng 35(5):1–4

    Article  MathSciNet  Google Scholar 

  4. Chang JY, Li MJ, Wang YC, Juan ST (2010) “Two-image encryption by random grids,” International Symposium on Communications and Information Technologies, pp. 458–463

  5. Chen CT, Lu TC (2004) “A mobile ticket validation by VSS tech with time-stamp,” in Proceedings of the 2004 I.E. International Conference on e-Technology, e-Commerce and e-Service (EEE’04), pp. 267–270

  6. Chen TH, Tsao KH (2011) Threshold visual secret sharing by random grids. J Syst Softw 84(7):1197–1208

    Article  Google Scholar 

  7. Eldefrawy MH, Alghathbar K, Khan MK (2011) “OTP-based two-factor authentication using mobile phones,” Eighth International Conference on Information Technology: New Generations, pp. 327–331

  8. Gargenta M (2011) Learning Android, O'Reilly Media, March

  9. Hsieh WB, Leu JS (2011) “Design of a time and location based One-Time Password authentication scheme,” Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, pp. 201–206

  10. Indu S, Sathya TN, Saravana KV (2013) “A stand-alone and SMS-based approach for authentication using mobile phone” International Conference on Information Communication and Embedded Systems, pp. 140–145

  11. Kafri O, Keren E (1987) Encryption of pictures and shapes by random grids. Opt Lett 12:377–379

    Article  Google Scholar 

  12. Lee JS, Li B, Wong HS (2012) “Survey-based study of novel visual cryptography mechanisms,” Communications of the Chinese Cryptology and Information Security Association, Vol. 18, No. 1, January

  13. Lee JS, Lin KS (2012) A robust e-commerce service: light-weight secure mail-order mechanism. Electron Commer Res Appl 11(4):388–396

    Article  Google Scholar 

  14. Lee JS, Lin KS (2013) An innovative electronic group-buying system for mobile commerce. Electron Commer Res Appl 12(1):1–13

    Article  MATH  Google Scholar 

  15. Lee JS, Lin PY, Chang CC (2010) Lightweight secure roaming mechanism between GPRS/UMTS and wireless LANs. Wirel Pers Commun 53(4):569–580

    Article  Google Scholar 

  16. Menezes AJ, van Oorschot PC, Vanstone SA (1996) “Handbook of applied cryptography,” CRC Press, October

  17. Naor M, Shamir A (1994) Visual cryptography. Proc Adv Cryptol-Eurocrypt 94:1–12, LNCS.950

    Google Scholar 

  18. PDFOCR URL:http://www.pdfocr.net/

  19. plustek URL:http://plustek.com/

  20. Roy S, Venkateswaran P (2014) “Online payment system using steganography and visual cryptography,” in Proceedings of2014 I.E. Students’ Conference on Electrical, Electronics and Computer Science (SCEECS), pp. 1–5

  21. Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613

    Article  MathSciNet  MATH  Google Scholar 

  22. Shyu SJ (2009) Image encryption by multiple random grids. Pattern Recogn 42:1582–1596

    Article  MATH  Google Scholar 

  23. Yen SM, Lin HC, Chen YC, Hung JJ, Wu JM (2014) PayStar: a denomination flexible micropayment scheme. Inf Sci 259:160–169

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jung-San Lee.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lee, JS., Wei, KJ., Chen, SJ. et al. Tele-micropayment scam prevention based on visual secret sharing technique. Multimed Tools Appl 75, 2233–2248 (2016). https://doi.org/10.1007/s11042-014-2403-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-014-2403-6

Keywords

Navigation