An Advanced Anti Phishing Approach Based On Two-Tier Validation

Abstract

Phishing on the web pages is an attempt by an individual or a group of hackers seeking to retrieve an individual’s personal private information such as passwords, usernames or confidential information, credit card information etc. In this paper, I am proposing a new approach named as “An Advanced anti phishing approach based on two-tier validation" to solve the problem of phishing. Anti-phishing schemes in the websites presently work on helping users to confirm whether a web site is honest or not. Image and OTP validation along with visual cryptography is a key advantage of this paper. The original image is divided into two blocks and rearrangement can be done and also a One Time Password will be generated. The use of visual cryptography technique((2,2) VCS scheme) is explored to reserve the privacy of image by degenerating the original image into two dissimilar image shares by manipulating the black and white pixel value of the image . Part of the image share and OTP will be stored in the servers such that the original image can be revealed only when both (client, server) of the shares are concurrently available. The individual share images do not reveal the identity of the original image . After the original image is revealed later merging different shares, which can be used as the first tier password and dynamically generated OTP can be used as password in the second tier. Dynamically generating the OTP by the system is one of the major advantages of the system.

Authors and Affiliations

P P N G Phani Kumar, R John Mathew

Keywords

Related Articles

K-Medoid Clustering Shows Negative Impact In Missing Data Imputation

Missing Data Imputation imputes the missing values from the known values. Rather than imputing from the whole dataset, imputation techniques are applied in the clusters generated by using clustering algorithm. In this...

Estimation of Complexity of the Regenerator Placement Problem in Optical Networks

Placement of regenerators in optical networks has attracted the attention of recent research works in optical networks. In this problem, we are given a network with an underlying topology of a graph and with a set o...

Emotion Recognition from Human Eye Expression

Facial expressions play an essential role in communications in social interactions with other human beings which deliver rich information about their emotions. The most crucial feature of human interaction that gran...

A survey – Energy Efficient Routing protocol for Homogenous & Heterogeneous Networks

The wireless sensor networks have gained a lot of grasp in the previous years due to various encroachments in this field. One of the major challenges faced by WSNs is the problem of energy efficiency. Various routing...

Study of Median Filter in Different Noise Density Environments in Binary Images

Image processing is one of the most dominating and it is very important processing in communication environment. Efficient processing methods and filters are needed for efficient communication. In this paper I am goin...

Download PDF file
  • EP ID EP28000
  • DOI -
  • Views 239
  • Downloads 0

How To Cite

P P N G Phani Kumar, R John Mathew (2014). An Advanced Anti Phishing Approach Based On Two-Tier Validation. International Journal of Research in Computer and Communication Technology, 3(9), -. https://europub.co.uk/articles/-A-28000