Downloads: 139 | Views: 309
Review Papers | Computer Science & Engineering | India | Volume 6 Issue 2, February 2017 | Popularity: 6.6 / 10
A Novel Approach to Anti-Phishing Using Visual Cryptography
Sofia Backiya B., Geetha M., Sathya M., Preethika D.
Abstract: Phishing is a criminal activity, fraudulent practice of sending emails purporting to be from reputable companies to induce individuals to reveal their information such as passwords, credit card number, etc. online. It has always been a simple and effective way to steal the credential of the user mainly on internet banking and e-commerce. All though methods like security image, etc. have been used but they have often proven ineffective. In order to avoid phishing in particular, we have made use of Visual Cryptography at login level on websites to verify its own identity and prove that it is a genuine website before the end users and make both the sides of the system secure as well as an authenticated one. This technique not only allows website to prove its identity but also adds another layer of security on it. This project makes use of Visual Cryptography Schema (VCS) to add an image based security for authentication for both the user and the website. The authentication was achieved by the three layer of checking which includes the password, security code and then the one-time password. The security code and the password will be given by the user during the process of registration. Once this is validated, the one-time password will be sent to the user to their mail ID.
Keywords: Shares creation, random number generation, Visual cryptographic algorithm, captcha generation, otp generation
Edition: Volume 6 Issue 2, February 2017
Pages: 878 - 881
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 656 | Views: 2004
Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Downloads: 401 | Views: 725
Computer Science & Engineering, India, Volume 7 Issue 11, November 2018
Pages: 1951 - 1955Hadoop Performance Improvement using Metadata and Securing with Oauth Token
Swapnali A. Salunkhe, Amol B. Rajmane
Downloads: 386 | Views: 704
Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1 - 3Comparative Study of Conventional Desktop Computer and Compute Stick
Aadarsh Sooraj, Sooraj G.
Downloads: 354 | Views: 700
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Downloads: 336 | Views: 691
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2148 - 2152The Impact and Application of 3D Printing Technology
Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera