Abstract
Telecommunication micropayment (Tele-micropayment) is an alternative of shelling out from traditional electronic commerce with high flexibility. It has been applied to the applications of online software, music, e-book, and game credit, in which the consumers are only charged with petty expense. The verification procedure of this payment relies on OTP(one time password) via SMS(short message service). Obtaining the OTP from smart phone and importing the content into the website is easy for a consumer to complete the transaction. Nevertheless, the SMS Spam Blocker has brought a fatal damage to Tele-micropayment, which could be spread by malicious smart phone Apps(Applications). With the intercepted SMS, an attacker can further learn the content to launch a micropayment scam. As the amount of micropayment is petty, it is hard to be aware of this behavior after the victim receives the bill. In this proposal, we aim to design a brand-new OTP by introducing visual secret sharing technique. According to the experiments, even the attacker can intercept the SMS to get OTP, he cannot learn the content via OCR(Optical character recognition) software. This has proved that our design can greatly help to stop this micropayment scam.
Similar content being viewed by others
References
ABBYY FineReader 11, URL: http://www.abbyy.com/
Chang CC, Chang SC (2009) “The design of e-traveler’s check with efficiency and mutual authentication,” Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, New York, USA, pp. 309–316
Chang CC, Chang SC, Lee JS (2009) An on-line electronic check system with mutual authentication. Comput Electr Eng 35(5):1–4
Chang JY, Li MJ, Wang YC, Juan ST (2010) “Two-image encryption by random grids,” International Symposium on Communications and Information Technologies, pp. 458–463
Chen CT, Lu TC (2004) “A mobile ticket validation by VSS tech with time-stamp,” in Proceedings of the 2004 I.E. International Conference on e-Technology, e-Commerce and e-Service (EEE’04), pp. 267–270
Chen TH, Tsao KH (2011) Threshold visual secret sharing by random grids. J Syst Softw 84(7):1197–1208
Eldefrawy MH, Alghathbar K, Khan MK (2011) “OTP-based two-factor authentication using mobile phones,” Eighth International Conference on Information Technology: New Generations, pp. 327–331
Gargenta M (2011) Learning Android, O'Reilly Media, March
Hsieh WB, Leu JS (2011) “Design of a time and location based One-Time Password authentication scheme,” Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, pp. 201–206
Indu S, Sathya TN, Saravana KV (2013) “A stand-alone and SMS-based approach for authentication using mobile phone” International Conference on Information Communication and Embedded Systems, pp. 140–145
Kafri O, Keren E (1987) Encryption of pictures and shapes by random grids. Opt Lett 12:377–379
Lee JS, Li B, Wong HS (2012) “Survey-based study of novel visual cryptography mechanisms,” Communications of the Chinese Cryptology and Information Security Association, Vol. 18, No. 1, January
Lee JS, Lin KS (2012) A robust e-commerce service: light-weight secure mail-order mechanism. Electron Commer Res Appl 11(4):388–396
Lee JS, Lin KS (2013) An innovative electronic group-buying system for mobile commerce. Electron Commer Res Appl 12(1):1–13
Lee JS, Lin PY, Chang CC (2010) Lightweight secure roaming mechanism between GPRS/UMTS and wireless LANs. Wirel Pers Commun 53(4):569–580
Menezes AJ, van Oorschot PC, Vanstone SA (1996) “Handbook of applied cryptography,” CRC Press, October
Naor M, Shamir A (1994) Visual cryptography. Proc Adv Cryptol-Eurocrypt 94:1–12, LNCS.950
PDFOCR URL:http://www.pdfocr.net/
plustek URL:http://plustek.com/
Roy S, Venkateswaran P (2014) “Online payment system using steganography and visual cryptography,” in Proceedings of2014 I.E. Students’ Conference on Electrical, Electronics and Computer Science (SCEECS), pp. 1–5
Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613
Shyu SJ (2009) Image encryption by multiple random grids. Pattern Recogn 42:1582–1596
Yen SM, Lin HC, Chen YC, Hung JJ, Wu JM (2014) PayStar: a denomination flexible micropayment scheme. Inf Sci 259:160–169
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Lee, JS., Wei, KJ., Chen, SJ. et al. Tele-micropayment scam prevention based on visual secret sharing technique. Multimed Tools Appl 75, 2233–2248 (2016). https://doi.org/10.1007/s11042-014-2403-6
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-014-2403-6