THE SECURED ANTI PHISHING APPROACH USING IMAGE BASED VALIDATION
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 9
Abstract
Anti-phishing schemes in the websites presently work on helping users to confirm whether a web site is honest or not. Phishing on the web pages is an attempt by an individual or a group to threats/hackers seeking to retrieve an individual’s personal private information such as passwords, usernames/confidential information, credit card information etc. In this paper, I am proposing a new approach named as “The secured anti phishing approach using image based validation" to solve the problem of phishing. Textual keyword validation along with visual cryptography is a key advantage of this paper. The original image is divided into many blocks and rearrangement can be done. The use of visual cryptography technique((2,2) VCS scheme) is explored to reserve the privacy of image by degenerating the original image into two dissimilar image shares by manipulating the black and white pixel value of the image . Part of the image share will be stored in the servers such that the original image can be revealed only when both (client, server) of the shares are concurrently available. The individual share images do not reveal the identity of the original image . After the original image is revealed later merging different shares, which can be used as the password. Dynamically generating the image by the system is one of the major advantages of the system.
Authors and Affiliations
Y. Yesu Jyothi, D. Srinivas, K. Govindaraju
A Privacy-Preserving Personalized Web Search Framework Ups To Generalize Profiles According To User-Specified Privacy Requirements
Personalized web search (PWS) is a universal group of search techniques aim at as long as better search results which are adapted for individual user needs. As the expense user information has to be together and anal...
A comprehensive survey on restructuring user search results with Feedback sessions
Search engine relevance and user experience is very important in web search applications. It can be improved by inferring and analyzing user search goals. This paper proposes a novel approach to infer user goals by a...
Location Fixing by 3 DF Stations using Triangulation Method
One of the most important requirements placed on EW (Electronic Warfare) systems is the location of threat emitters. The paper deals with the location of an object at unknown position, on which bearings are taken fro...
A New Data Driven Model For Bigdata Using Datamining
Data mining is extension to data warehouse which derives useful patterns help us to take decision’s for business growth .but present volume of data increased comes from different sources along with complex relationsh...
K-Medoid Clustering Shows Negative Impact In Missing Data Imputation
Missing Data Imputation imputes the missing values from the known values. Rather than imputing from the whole dataset, imputation techniques are applied in the clusters generated by using clustering algorithm. In this...