Visual Cryptography Implementation with Key Sharing For Effective Phishing Detection Process

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2

Abstract

The advent of the internet, various online attacks has been increased and among them the most popular attack is phishing. Phishing is an attempt by an individual or a group to get personal, confidential information such as passwords, credit card information from unsuspecting victims for identity theft, financial gain and other fraudulent activities. Fake websites which appear very similar to the original ones are being hosted to achieve the effective phishing detection The result shows that if we focus on user also know using a website genuine or not, we can detect genuine site to avoid wasting network resources

Authors and Affiliations

B. K. Prasath, P. Ashok Kumar

Keywords

Related Articles

[u][/u]Effect of Different Mobility Patterns on AODV and OLSR using Different TCP variants

Abstract: In this paper the effect of TCP variant (new reno, tahoe and Sack) is analyzed by using karan’s and nagle theorem by moving nodes at different mobility models on OLSR and AODV protocol. In this nagle theorem is...

Security Suite for IT and Telecom Industries

Abstract: Security is the biggest concern nowadays faced by various companies as security threats are more prevalent. This „openness‟ is the reason because of which protecting networks and business data is even more diff...

 Role of Computers in Bioinformatics by Using Different Biological Datasets

 Abstract: The amount and variety of data in natural sciences increases rapidly. Data abstraction, data manipulation and pattern discovery techniques are of great need in order to deal with such large quantities....

The Evaluation of (CapEx/OpEx) Cost reduction of IPTV Service delivery using SDN Solution

This paper aims to quantify and evaluate the cost saving of offering IPTV service through the ‘Gold’ Network Solutions implemented in IPTV SMC ISP data center; SDN and NFV.Recently, the demand for Streaming services like...

 11 × 11 Playfair Cipher based on a Cascade of LFSRs

 Playfair cipher is one of the better-known multiple letter encryption ciphers. In this method, the diagrams in the plaintext are treated as a single unit and then these units converted into ciphertext diagrams.&n...

Download PDF file
  • EP ID EP162797
  • DOI 10.9790/0661-1623116119
  • Views 85
  • Downloads 0

How To Cite

B. K. Prasath, P. Ashok Kumar (2014). Visual Cryptography Implementation with Key Sharing For Effective Phishing Detection Process. IOSR Journals (IOSR Journal of Computer Engineering), 16(2), 116-119. https://europub.co.uk/articles/-A-162797