THE SECURED ANTI PHISHING APPROACH USING IMAGE BASED VALIDATION
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 9
Abstract
Anti-phishing schemes in the websites presently work on helping users to confirm whether a web site is honest or not. Phishing on the web pages is an attempt by an individual or a group to threats/hackers seeking to retrieve an individual’s personal private information such as passwords, usernames/confidential information, credit card information etc. In this paper, I am proposing a new approach named as “The secured anti phishing approach using image based validation" to solve the problem of phishing. Textual keyword validation along with visual cryptography is a key advantage of this paper. The original image is divided into many blocks and rearrangement can be done. The use of visual cryptography technique((2,2) VCS scheme) is explored to reserve the privacy of image by degenerating the original image into two dissimilar image shares by manipulating the black and white pixel value of the image . Part of the image share will be stored in the servers such that the original image can be revealed only when both (client, server) of the shares are concurrently available. The individual share images do not reveal the identity of the original image . After the original image is revealed later merging different shares, which can be used as the password. Dynamically generating the image by the system is one of the major advantages of the system.
Authors and Affiliations
Y. Yesu Jyothi, D. Srinivas, K. Govindaraju
A Efficient QOS based User selection in Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks
A wireless sensor network (WSN) consists of spatially distributed autonomous sensors to monitor physical or environmental conditions. Wireless reprogramming in a wireless sensor network (WSN) is the process of propag...
A Reliable implementation of Security-Enabled Architecture with area optimized symmetric Cryptography
My project specifies a symmetric Cryptography technique which provides same keys to Cipher and Decipher to transfer the information for reducing the design complexity and AES (Advanced Encryption Standard) which prov...
Image Encryption Using Modified Particle Swarm Optimization
In this age of universal electronic connectivity, there is indeed no time at which security does not matter. Two trends have enough to make this work as vital need. First, the explosive growth in computer systems and...
Storage Correctness Verification and Data Regaining In Cloud
Users no longer hold physical possession of the outsourced data makes the data integrity protection in cloud computing a formidable task particularly for users with constrained computing resources. Moreover users sho...
Analysis of Four Stage Encryption
Four Stage Encryption generates the output alphabet from a given input alphabet. The size of the output alphabet depends upon the key K0. Unless this key is known, it is difficult to guess the size of the output alph...