THE SECURED ANTI PHISHING APPROACH USING IMAGE BASED VALIDATION
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 9
Abstract
Anti-phishing schemes in the websites presently work on helping users to confirm whether a web site is honest or not. Phishing on the web pages is an attempt by an individual or a group to threats/hackers seeking to retrieve an individual’s personal private information such as passwords, usernames/confidential information, credit card information etc. In this paper, I am proposing a new approach named as “The secured anti phishing approach using image based validation" to solve the problem of phishing. Textual keyword validation along with visual cryptography is a key advantage of this paper. The original image is divided into many blocks and rearrangement can be done. The use of visual cryptography technique((2,2) VCS scheme) is explored to reserve the privacy of image by degenerating the original image into two dissimilar image shares by manipulating the black and white pixel value of the image . Part of the image share will be stored in the servers such that the original image can be revealed only when both (client, server) of the shares are concurrently available. The individual share images do not reveal the identity of the original image . After the original image is revealed later merging different shares, which can be used as the password. Dynamically generating the image by the system is one of the major advantages of the system.
Authors and Affiliations
Y. Yesu Jyothi, D. Srinivas, K. Govindaraju
Evaluate the Vulnerabilities of Existing Protocols to Routing Layer Resource Depletion Attacks
We describe a Resource Depletion attack as the work of art and transmission of a message that causes more energy to be consumed by the network than if an honest node transmitted a message of identical size to the sam...
Estimating the qos parameters and enhancing performance by implementing cluster head in MANET
In the MANET each node communicates with the other node temporarily and stops all the communication when all the data transfers done. Clustering (used in MANET) provides an effective way to allocate wireless channels...
In-dependable Data hiding in an Encrypted Image using FCM-DH Algorithm
In this paper, a data mining technique, Fuzzy C Means Clustering (FCM) based data hiding algorithm (FCM-DH) is used to divide pixels into classes or clusters from the encrypted image. Clustering of pixels in an encry...
After BI: What’s the Future Intelligence?
Traditional Business Intelligence (BI) approaches have fallen short in delivering the expected value and return on investment. High costs, lengthy implementations and increasing complexity have led to frustration and...
Invalid Detachment centered Outlier Recognition acquired from Reverse Nearest Neighbors
Data Mining essentially alludes to the extraction of exceptionally fascinating examples of the Data from the gigantic Data sets. Anomaly recognition is one of the imperative parts of Data mining which really discover...