An Advanced Anti Phishing Approach Based On Two-Tier Validation

Abstract

Phishing on the web pages is an attempt by an individual or a group of hackers seeking to retrieve an individual’s personal private information such as passwords, usernames or confidential information, credit card information etc. In this paper, I am proposing a new approach named as “An Advanced anti phishing approach based on two-tier validation" to solve the problem of phishing. Anti-phishing schemes in the websites presently work on helping users to confirm whether a web site is honest or not. Image and OTP validation along with visual cryptography is a key advantage of this paper. The original image is divided into two blocks and rearrangement can be done and also a One Time Password will be generated. The use of visual cryptography technique((2,2) VCS scheme) is explored to reserve the privacy of image by degenerating the original image into two dissimilar image shares by manipulating the black and white pixel value of the image . Part of the image share and OTP will be stored in the servers such that the original image can be revealed only when both (client, server) of the shares are concurrently available. The individual share images do not reveal the identity of the original image . After the original image is revealed later merging different shares, which can be used as the first tier password and dynamically generated OTP can be used as password in the second tier. Dynamically generating the OTP by the system is one of the major advantages of the system.

Authors and Affiliations

P P N G Phani Kumar, R John Mathew

Keywords

Related Articles

Integrity And Confidentiality for Network Security

We compute the liability metric as a function of the steering and the cryptographic protocols used to secure the complex passage. We formulate the minimum cost node capture attack problem as a nonlinear integer progra...

Streaming of High Quality videos using Cloud

Recently many mobile entertaining applications have been launched, but most popular app like Facebook, Twitter, YouTube have large demand among users. But these media applications are limited by the unstable wireless...

The Feasibility of Content Sharing With (Dtn) On Commercial Smart Phones

The increase in the number of smart phone users has lead to the increase in the peer-topeer adhoc content sharing. Traditional data delivery schemes are not suitable for such networks due to intermittent connectivity...

Tone Reservation Technique Based Clipping and Filtering Method for PAPR Reduction by Scaling Residual noise

OFDM is an extinguishly used next-generation wireless transmission technique because of its easy equalization. OFDM can send over hundreds of parallel data streams via multiple carriers which makes the possibility of...

PARTIAL UPDATE ADAPTIVE TECHNIQUES FOR WIRELESS NETWORKS

An adaptive distributed strategy is developed based on incremental techniques. Distributed wireless sensor networks finds many remote sensing applications like battle field, surveillance, target localization, environ...

Download PDF file
  • EP ID EP28000
  • DOI -
  • Views 277
  • Downloads 0

How To Cite

P P N G Phani Kumar, R John Mathew (2014). An Advanced Anti Phishing Approach Based On Two-Tier Validation. International Journal of Research in Computer and Communication Technology, 3(9), -. https://europub.co.uk/articles/-A-28000