Anti Phishing approach using Visual Cryptography and Iris Recognition
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 3
Abstract
Phishing is a form of online identity theft. Phishing webpages are forged webpages created by malicious people that aim to steal sensitive information such as online banking passwords and credit card informations. This paper “anti phishing approach using visual cryptography and iris recognition” presents an approach for detecting and preventing phishing attacks on online banking portal. This paper uses two techniques such as visual cryptography and iris authentication. In visual cryptography an image captcha is decomposed into shares such that stacking sufficient number of shares reveals the original image captcha. This is used to cross verify a website identity. For authenticating user a biometric method called iris recognition is used.
Authors and Affiliations
Saranya Shaji , Gripsy Paul
Design of Asynchronous Viterbi Decoder using VHDL for Low Power Consumption
In today’s digital communication systems, Convolutional codes are widely utilize in channel coding techniques. The Viterbi decoder due to its efficient performance is broadly used for decoding the convolution codes....
VLSI Implementation and Design of Digital Modulation Using Xilinx
In this Paper, Digital Modulators is designed and Implemented using XILINX ISE Tool based on Very Large Scale Integration (VLSI). This is majorly to implement and obtain digitalize signals in softwaredefined radio (SD...
Modelling of Buck-Boost Converter for Photovoltaic and Battery Power Systems
In this paper a buck-boost converter with photovoltaic (PV) and battery power for high step-up system is discussed and implemented. The motive of this project is to design a MPPT(maximum power point tracking ) Algori...
Medical and Multimedia Image Compression using Multi Resolution Transforms
The development of image compression algorithms is the chief matter of concern in the field of image and video processing as the amount of data either in the form of images or videos, sent over internet is of elephant...
Design of Efficient DSP operation using 16×16 R-MAC Unit
As we already know that the multiplication and accumulation are the vital operations involved in DSP `applications. In DSP processor we need high speed performance for different applications. In order to increase thi...