THE SECURED ANTI PHISHING APPROACH USING IMAGE BASED VALIDATION

Abstract

Anti-phishing schemes in the websites presently work on helping users to confirm whether a web site is honest or not. Phishing on the web pages is an attempt by an individual or a group to threats/hackers seeking to retrieve an individual’s personal private information such as passwords, usernames/confidential information, credit card information etc. In this paper, I am proposing a new approach named as “The secured anti phishing approach using image based validation" to solve the problem of phishing. Textual keyword validation along with visual cryptography is a key advantage of this paper. The original image is divided into many blocks and rearrangement can be done. The use of visual cryptography technique((2,2) VCS scheme) is explored to reserve the privacy of image by degenerating the original image into two dissimilar image shares by manipulating the black and white pixel value of the image . Part of the image share will be stored in the servers such that the original image can be revealed only when both (client, server) of the shares are concurrently available. The individual share images do not reveal the identity of the original image . After the original image is revealed later merging different shares, which can be used as the password. Dynamically generating the image by the system is one of the major advantages of the system.

Authors and Affiliations

Y. Yesu Jyothi, D. Srinivas, K. Govindaraju

Keywords

Related Articles

A Framework for Administration Assault Recognition in Multivariate Connection Exploration

Denial of-Service (DoS) attacks are a basic danger to the Internet. It is extremely arduous to follow back the assailants for the reason that of memory less element of the web directing components. Subsequently, ther...

Secure Transmission and Minimizing Communication Over Head In Cooperative Group

A mobile ad-hoc network is a selfconfiguring infrastructure less network of mobile devices connected by wireless. Here the problem is efficiently and securely broadcasting to cooperative groups and trusted key generat...

Responsive Transmitting For Mobile Adhoc Network Routing Topology

Cooperative communication as became most important research topic for the people in wireless network. Most of the works focuses on the data link layer and physical layer where as ignorance of other layer and network...

Routing Problem: MANET And Ant Colony Algorithm

Mobile ad hoc network (MANET) is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any centralized administration and the biggest challenge in MANETs is to find a path b...

Survey on Different Data Hiding Techniques

Data is a vital resource in all areas. With the wide use of internet, the security of the data being transmitted over internet also became an important challenge. Now data security over internet has been an important...

Download PDF file
  • EP ID EP27662
  • DOI -
  • Views 254
  • Downloads 4

How To Cite

Y. Yesu Jyothi, D. Srinivas, K. Govindaraju (2013). THE SECURED ANTI PHISHING APPROACH USING IMAGE BASED VALIDATION. International Journal of Research in Computer and Communication Technology, 2(9), -. https://europub.co.uk/articles/-A-27662