Anti-Phishing Framework Using QR Code Validation Scheme Based On Visual Cryptography
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 3
Abstract
Due to new innovations and ideas in internet technologies many web applications, mainly in e-commerce application; online transactions have become most popular feature for these domains. Now-a-days as use of internet for transactions has grown, the threat of security over internet has also grown. The threat concerned with security includes many attacks like Denial of Service, E-mail spoofing, phishing, viruses and worms, etc. One of the most popular and familiar attack used by hackers is phishing and is carried out by hackers with an intention to gain confidential data, credential information like password, credit/debit card number. Therefore there is need to create a new methodology to prevent from such type of attacks. Hackers use this attack in many fields, including mainly in e-commerce and banking domains and it has been recorded in history. Here, in this paper we describe a methodology for phishing detection and prevention which can be used to detect the phishing website. It is based on the Anti-Phishing framework using QR Code validation scheme based on visual cryptography. Using this framework, user can verify whether the website is fake or real and prevents user from entering password and other confidential information to the phishing websites.
Authors and Affiliations
Sneha Mali, Sumita Tanpure, Komal Kumkar, Swapnali Patil, Prof. S. A. Darade
Analysis of Preamble and Synchronization Errors Estimation in Wireless OFDM Communications
Global mobile data usage increase by almost threefold [4] in the year 2010 . This increased data usage is from the rise in the number of consumer electronic devices that rely on wireless standards such as IEEE802.11 (Wi...
Online Election System Based on Aadhar Authentication
The project is mainly aimed at providing a most secured and user friendly Online Election System. Online election system is a voting technique. In Traditional election environment voting process sometimes become quite i...
Setting Time and Sem Analysis For Cement Mortar Containing Partial Replacement Of Fine Aggregate By Green Sand And Bottom Ash
Cement, Sand and Aggregate are essential need for construction firm. Consumption of cement is high, due to large use of concrete and mortar. Cement, sand and aggregate are basic needs for any construction industry. Sand...
Intelligent Speed Observing in Transportation system Using ARM 9
Radio Frequency Identification (RFID) has attracted considerable attentions in recent years for its broad applications and complements to the current GPS navigation system when GPS signals are not available But in pract...
Nature Inspired Energy Efficient Wireless Sensor Networks Using Dynamic SleepActive Algorithm
Wireless communication is the demand of the current technology with fast computational techniques where different type of sensor nodes or motes are deployed densely within the phenomenon or very close to it, structuring...