THE SECURED ANTI PHISHING APPROACH USING IMAGE BASED VALIDATION

Abstract

Anti-phishing schemes in the websites presently work on helping users to confirm whether a web site is honest or not. Phishing on the web pages is an attempt by an individual or a group to threats/hackers seeking to retrieve an individual’s personal private information such as passwords, usernames/confidential information, credit card information etc. In this paper, I am proposing a new approach named as “The secured anti phishing approach using image based validation" to solve the problem of phishing. Textual keyword validation along with visual cryptography is a key advantage of this paper. The original image is divided into many blocks and rearrangement can be done. The use of visual cryptography technique((2,2) VCS scheme) is explored to reserve the privacy of image by degenerating the original image into two dissimilar image shares by manipulating the black and white pixel value of the image . Part of the image share will be stored in the servers such that the original image can be revealed only when both (client, server) of the shares are concurrently available. The individual share images do not reveal the identity of the original image . After the original image is revealed later merging different shares, which can be used as the password. Dynamically generating the image by the system is one of the major advantages of the system.

Authors and Affiliations

Y. Yesu Jyothi, D. Srinivas, K. Govindaraju

Keywords

Related Articles

Enhanced Sparse Coding Technique For Top Image List

Image reranking is successful for enhancing the execution of a content based picture seek. Be that as it may, existing reranking algorithms are constrained for two principle reasons: 1) the literary meta-information...

Design of Built-in Self-Repair Strategy with Selectable Redundancy for Embedded SRAM

The main strategy of this project is to design a fault diagnoses system for detection and repair of any permanent failures or faults in the embedded read only memories. Built-In Self-Repair (BISR) with redundancy is...

Intelligent Ambulance Rescue System

Traffic problems, congested traffic and flow management were recognized as major problems mostly in all the areas, which have caused problem for the ambulance which carries the emergency patient. Moreover road accide...

EFFICIENT COLLABORATIVE SCIENTIFIC WORKFLOW COMPOSITION USING SERVICE ORIENTED COLLABORATION MODEL

Collaboration has become a dominant feature of modern science. Many scientific problems are beyond the realm of individual discipline or scientist to solve and hence require collaborative efforts. Modern scientific d...

Estimation of Complexity of the Regenerator Placement Problem in Optical Networks

Placement of regenerators in optical networks has attracted the attention of recent research works in optical networks. In this problem, we are given a network with an underlying topology of a graph and with a set o...

Download PDF file
  • EP ID EP27662
  • DOI -
  • Views 279
  • Downloads 4

How To Cite

Y. Yesu Jyothi, D. Srinivas, K. Govindaraju (2013). THE SECURED ANTI PHISHING APPROACH USING IMAGE BASED VALIDATION. International Journal of Research in Computer and Communication Technology, 2(9), -. https://europub.co.uk/articles/-A-27662