An Advanced Anti Phishing Approach Based On Two-Tier Validation

Abstract

Phishing on the web pages is an attempt by an individual or a group of hackers seeking to retrieve an individual’s personal private information such as passwords, usernames or confidential information, credit card information etc. In this paper, I am proposing a new approach named as “An Advanced anti phishing approach based on two-tier validation" to solve the problem of phishing. Anti-phishing schemes in the websites presently work on helping users to confirm whether a web site is honest or not. Image and OTP validation along with visual cryptography is a key advantage of this paper. The original image is divided into two blocks and rearrangement can be done and also a One Time Password will be generated. The use of visual cryptography technique((2,2) VCS scheme) is explored to reserve the privacy of image by degenerating the original image into two dissimilar image shares by manipulating the black and white pixel value of the image . Part of the image share and OTP will be stored in the servers such that the original image can be revealed only when both (client, server) of the shares are concurrently available. The individual share images do not reveal the identity of the original image . After the original image is revealed later merging different shares, which can be used as the first tier password and dynamically generated OTP can be used as password in the second tier. Dynamically generating the OTP by the system is one of the major advantages of the system.

Authors and Affiliations

P P N G Phani Kumar, R John Mathew

Keywords

Related Articles

Survey on DLMS Adaptive Filter With Low Delay

In practical applications of the LMS adaptive transversal filtering algorithm, a delay in the coefficient is updated. This paper discusses about the behavior of the delayed LMS algorithm. This paper present an effici...

Short Term Load Forecasting Using Artificial Neural Networks

The main objective of the paper is to forecast the load for the next 24 hours, as well one week, considering one month of load data. Load forecasting is an important problem in the operation and planning of electrica...

A Survey on Multipath Routing Protocols for Reliable Data Transmission in Wireless Sensor Networks

Multipath routing approach is used in wireless sensor networks to improve network performance through efficient utilization of available network resources. In Wireless sensor networks (WSNs) many multipath routing pro...

Faults Identification by Passing Test Packets Through Efficient Tool In Network

ATPG comprehends router designs and produces a device autonomous model. The reproduction is utilized to deliver a base arrangement of test packets to negligibly put into impact each connection in the network or maxim...

Efficient Recovery of Data In Digital Communication Using FPGA

Survey on reduction in error by special encoding and decoding technique using FPGA that is by using convolutional encoding and viterbi decoding. Forward error correction (FEC) is one of the key parts of any digital c...

Download PDF file
  • EP ID EP28000
  • DOI -
  • Views 263
  • Downloads 0

How To Cite

P P N G Phani Kumar, R John Mathew (2014). An Advanced Anti Phishing Approach Based On Two-Tier Validation. International Journal of Research in Computer and Communication Technology, 3(9), -. https://europub.co.uk/articles/-A-28000