International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 134 | Views: 389

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 3, March 2013 | Popularity: 7 / 10


     

Countering Phishing Threats using Visual Cryptography

G. Pavithra, D. S. John Deva Prasanna


Abstract: Phishing is an attempt by an individual or a group to get personal confidential information such as passwords, credit card information from unsuspecting victims for identity theft, financial gain and other fraudulent activities. Fake websites which appear very similar to the original ones are being hosted to achieve this. In this paper we have proposed a new approach named as Countering Phishing Threats using visual cryptography to solve the problem of phishing. Phishers can attack the most confidential information of the user from the authorized websites. Here an image based authentication using Visual Cryptography is implemented. In Visual Cryptography (VC) an image is decomposed into shares and in order to reveal the original image appropriate number of shares should be combined. The use of visual cryptography is explored to preserve the privacy of an image captcha by decomposing the original image captcha into two shares that are stored in separate database servers such that the original image captcha can be revealed only when both are simultaneously available; the individual sheet images do not reveal the identity of the original image captcha. Due to frequent change in image captcha the authenticated information like password cannot be stolen by the phisher. Once the original image captcha is revealed to the user can be used as the password. Using this cryptography methodology, we can verify its identity and proves that it is a genuine website before the end user.


Keywords: visual cryptography, image captcha, uniform resource language, visual Cryptography Scheme


Edition: Volume 2 Issue 3, March 2013


Pages: 34 - 38



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
G. Pavithra, D. S. John Deva Prasanna, "Countering Phishing Threats using Visual Cryptography", International Journal of Science and Research (IJSR), Volume 2 Issue 3, March 2013, pp. 34-38, https://www.ijsr.net/getabstract.php?paperid=IJSRON2013533



Similar Articles

Downloads: 101

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1054 - 1058

Colour Extended Visual Cryptography based on MKGED

T. Anuradha, Dr. K. Usha Rani

Share this Article

Downloads: 101

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1526 - 1530

A New Meaningful Adaptive Region Incrementing Visual Secret Sharing Based on Error Diffusion and Permutation Encoding with Cheating Prevention

Anju Mohan

Share this Article

Downloads: 106

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2545 - 2549

Implementation of Random Grid Visual Cryptography for Color Images

Snehal N. Meshram, Sneha U. Bohra

Share this Article

Downloads: 107

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2657 - 2659

An Outline of Various Secret Sharing Techniques

Kavita Choudhary, Kumar Vaibhav

Share this Article

Downloads: 107 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1155 - 1157

Avoidance of Unauthorized user using Visual Cryptography

Dayanand G Savakar, Pandurang H Biradar

Share this Article



Top