Enhanced Phishing Detection based on Image Differentiation
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 10, October 2014

Enhanced Phishing Detection based on Image Differentiation

B. Jenny Jyoshna, Shaik Nyamathulla

Phishing is an art of creating a illegal look-a-like website of ethical trusted legal website, and dupe customer by sending an wrong information or link asking them to use their private passwords and username or pins to gain access. When the customer mistakes or unknowingly use their essential of access to website, this phishers collect mainly email, banking, company login accounts that are targeted. This paper proposes an image differentiation methodology or architecture to detect legality of the website with a well know captcha technology and Googles ranking where user cross checks with multiple authentication procedures in order to tackle with phishing problem.

Keywords: Phishing, ethical, image captcha, shares, private passwords, differentiation

Edition: Volume 3 Issue 10, October 2014

Pages: 2313 - 2317

Share this Article

How to Cite this Article?

B. Jenny Jyoshna, Shaik Nyamathulla, "Enhanced Phishing Detection based on Image Differentiation", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=15101409, Volume 3 Issue 10, October 2014, 2313 - 2317

105 PDF Views | 89 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Phishing'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2313 - 2317

Enhanced Phishing Detection based on Image Differentiation

B. Jenny Jyoshna, Shaik Nyamathulla

Share this Article

Research Proposals or Synopsis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 310 - 313

Secure Server Verification by using Encryption Algorithm and Visual Cryptography

Shreya Zarkar, Sayali Vaidya, Achal Bharambe, Arifa Tadvi, Tanashree Chavan

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 659 - 661

A Review of Anti Phishing Framework based on Visual Cryptography

D. N. Rewadkar, Asmita D. Abhyankar

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2336 - 2339

Online Payment System using BPCS Steganography and Visual Cryptography

S. R. Khonde, Dheeraj Agarwal, Shrinivas Deshmukh

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1488 - 1491

A Survey on: Email Security for Targeted Malicious Attacks

Jagdish R. Yadav, Dr. A. K. Srivastava

Share this Article

Similar Articles with Keyword 'ethical'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2313 - 2317

Enhanced Phishing Detection based on Image Differentiation

B. Jenny Jyoshna, Shaik Nyamathulla

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1075 - 1082

Ethical Explosive Explosion Computer Control For Disaster Managemnt

P.K Bishnoi, Nisha Sangwan, Dr. Dharmender Kumar

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 574 - 579

Internet Banking Fraud Detection using HMM and BLAST-SSAHA Hybridization

Avanti H. Vaidya, S. W. Mohod

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3198 - 3203

A Study and Review of Techniques of Spatial Steganography

Ravneet Kaur, Bhavneet Kaur

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 529 - 531

Need of Ethical Hacking in Online World

Monika Pangaria, Vivek Shrivastava

Share this Article

Similar Articles with Keyword 'image captcha'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2313 - 2317

Enhanced Phishing Detection based on Image Differentiation

B. Jenny Jyoshna, Shaik Nyamathulla

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 852 - 855

An Efficient User Authentication using Captcha and Graphical Passwords-A Survey

S. Karthika, Dr. P. Devaki

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 3002 - 3005

Survey Paper on Genetically Optimized Face Image CAPTCHA

Juhi Shah, D. N. Rewadkar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 3, March 2013

Pages: 34 - 38

Countering Phishing Threats using Visual Cryptography

G. Pavithra, D. S. John Deva Prasanna

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 2, February 2014

Pages: 305 - 310

Anti Phishing using Visual Cryptography

Amit Navarkar, D. A. Phalke

Share this Article

Similar Articles with Keyword 'shares'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1526 - 1530

A New Meaningful Adaptive Region Incrementing Visual Secret Sharing Based on Error Diffusion and Permutation Encoding with Cheating Prevention

Anju Mohan

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1155 - 1157

Avoidance of Unauthorized user using Visual Cryptography

Dayanand G Savakar, Pandurang H Biradar

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2433 - 2435

Literature Review on a Natural Image Based VSS Scheme for Sharing Secret Image

Priya K. Rahangdale, A. N. Jaiswal

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2313 - 2317

Enhanced Phishing Detection based on Image Differentiation

B. Jenny Jyoshna, Shaik Nyamathulla

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2545 - 2549

Implementation of Random Grid Visual Cryptography for Color Images

Snehal N. Meshram, Sneha U. Bohra

Share this Article

Similar Articles with Keyword 'differentiation'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2313 - 2317

Enhanced Phishing Detection based on Image Differentiation

B. Jenny Jyoshna, Shaik Nyamathulla

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2234 - 2241

Distributed Direct Neighbour Comparison Based Approach

Pankaj Singh Chouhan, Brajesh Kumar Shrivash, Nidhi Bajpai

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2774 - 2779

Admission Control in Heterogeneous Network: Overview

Rajeshwari C. Choukimath, Vasudha V. Ayyannavar

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1606 - 1610

Detection and Tracing Technique for DDoS Attacks from Flash Crowd

Dipali Pawar, Sachin Babar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2323 - 2328

An Enhanced Anti Phishing Approach Based on Threshold Value Differentiation

Komatla. Sasikala, P. Anitha Rani

Share this Article
Top