Paying with a Selfie: A Hybrid Micro-payment Framework Based on Visual Cryptography

  • Stelvio Cimato
  • Ernesto Damiani
  • Fulvio FratiEmail author
  • Joël T. Hounsou
  • Judicaël Tandjiékpon
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 171)


In developing countries, the mobile revolution is happening in these days, and technology is now improving life conditions and providing new opportunities for the developing of the economies. In this paper, we provide a micro-payment framework that can be used to conclude everyday financial transactions. The novelty of the approach relies on the usage of techniques of easy understanding and application, even for uncultured people. The security of the system is also ensured by exploiting visual cryptography schemes, whose reconstruction phase requires no particular technical skills and relies only on human activities. The description of usage scenarios and the prototypal architecture of the framework are provided together with the initial plan for the experimental deployment.


Micro-payment Visual cryptography Mobile 


  1. 1.
    Business case studies: using technology to improve economies (2015).
  2. 2.
    Kochi, E.: How the future of mobile lies in the developing world (2012).
  3. 3.
  4. 4.
  5. 5.
    Cimato, S., Yang, C.-N.: Visual Cryptography and Secret Image Sharing. CRC Press Inc., Boca Raton (2011)Google Scholar
  6. 6.
    Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)Google Scholar
  7. 7.
    Chaum, D.: Secret-ballot receipts: true voter-verifiable elections. IEEE Secur. Priv. 2(1), 38–47 (2004)CrossRefGoogle Scholar
  8. 8.
    Jagun, A., Heeks, R., Whalley, J.: The impact of mobile telephony on developing country micro-enterprise: a nigerian case study. Inf. Technol. Int. Dev. 4(4), 47–65 (2008)CrossRefGoogle Scholar
  9. 9.

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2016

Authors and Affiliations

  • Stelvio Cimato
    • 1
  • Ernesto Damiani
    • 1
    • 2
  • Fulvio Frati
    • 1
    Email author
  • Joël T. Hounsou
    • 3
  • Judicaël Tandjiékpon
    • 3
  1. 1.Department of Computer ScienceUniversità degli Studi di MilanoMilanItaly
  2. 2.Etisalat British Telecom Innovation CenterKhalifa UniversityAbu DhabiUAE
  3. 3.Institut de Mathématiques et de Sciences PhysiquesPorto NovoBenin

Personalised recommendations