THE SECURED ANTI PHISHING APPROACH USING IMAGE BASED VALIDATION

Abstract

Anti-phishing schemes in the websites presently work on helping users to confirm whether a web site is honest or not. Phishing on the web pages is an attempt by an individual or a group to threats/hackers seeking to retrieve an individual’s personal private information such as passwords, usernames/confidential information, credit card information etc. In this paper, I am proposing a new approach named as “The secured anti phishing approach using image based validation" to solve the problem of phishing. Textual keyword validation along with visual cryptography is a key advantage of this paper. The original image is divided into many blocks and rearrangement can be done. The use of visual cryptography technique((2,2) VCS scheme) is explored to reserve the privacy of image by degenerating the original image into two dissimilar image shares by manipulating the black and white pixel value of the image . Part of the image share will be stored in the servers such that the original image can be revealed only when both (client, server) of the shares are concurrently available. The individual share images do not reveal the identity of the original image . After the original image is revealed later merging different shares, which can be used as the password. Dynamically generating the image by the system is one of the major advantages of the system.

Authors and Affiliations

Y. Yesu Jyothi, D. Srinivas, K. Govindaraju

Keywords

Related Articles

An Advanced Scheme to Support Stronger Security By Encrypting The File With Differential Privilege Keys

Developing Cloud is registering innovation, giving measured administration and cash putting something aside for individual Users and associations. Information proprietors are exchanging nearby delicate information to...

Implementation of Node to Node Communication System on ARM 7 using CAN Bus

This project aims in designing a system which helps in monitoring and controlling multisingle chip communication system using CAN (Controller Area Network) protocol using LPC 2129 ARM. This system helps to achieve co...

A Survey on Routing Protocols for Wireless Sensor Networks

A wireless sensor network is a specialized wireless network consisting of a large number of sensors and at least one base station. The most important difference between the wireless sensor network and the traditional...

Detection of DDos Attack using HCIF Algorithm in Cloud Computing

Cloud Computing is an emerging buzzword in the IT industry and offers three types of services as Software as a Service (SaaS), Infrastructure as a Service (IaaS) and Platform as a Service (PaaS). To launch a coordinat...

Image Watermarking And Its Techniques: A Review

With the fast development in computer network and multimedia technology, the need of protecting the ownership of digital media becomes a major issue. Digital watermarking is a process of hiding imperceptible data int...

Download PDF file
  • EP ID EP27662
  • DOI -
  • Views 303
  • Downloads 4

How To Cite

Y. Yesu Jyothi, D. Srinivas, K. Govindaraju (2013). THE SECURED ANTI PHISHING APPROACH USING IMAGE BASED VALIDATION. International Journal of Research in Computer and Communication Technology, 2(9), -. https://europub.co.uk/articles/-A-27662