Countering Phishing Threats using Visual Cryptography
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 2 Issue 3, March 2013

Countering Phishing Threats using Visual Cryptography

G. Pavithra, D. S. John Deva Prasanna

Phishing is an attempt by an individual or a group to get personal confidential information such as passwords, credit card information from unsuspecting victims for identity theft, financial gain and other fraudulent activities. Fake websites which appear very similar to the original ones are being hosted to achieve this. In this paper we have proposed a new approach named as "Countering Phishing Threats using visual cryptography" to solve the problem of phishing. Phishers can attack the most confidential information of the user from the authorized websites. Here an image based authentication using Visual Cryptography is implemented. In Visual Cryptography (VC) an image is decomposed into shares and in order to reveal the original image appropriate number of shares should be combined. The use of visual cryptography is explored to preserve the privacy of an image captcha by decomposing the original image captcha into two shares that are stored in separate database servers such that the original image captcha can be revealed only when both are simultaneously available; the individual sheet images do not reveal the identity of the original image captcha. Due to frequent change in image captcha the authenticated information like password cannot be stolen by the phisher. Once the original image captcha is revealed to the user can be used as the password. Using this cryptography methodology, we can verify its identity and proves that it is a genuine website before the end user.

Keywords: visual cryptography, image captcha, uniform resource language, visual Cryptography Scheme

Edition: Volume 2 Issue 3, March 2013

Pages: 34 - 38

Share this Article

How to Cite this Article?

G. Pavithra, D. S. John Deva Prasanna, "Countering Phishing Threats using Visual Cryptography", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSRON2013533, Volume 2 Issue 3, March 2013, 34 - 38

71 PDF Views | 55 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'visual cryptography'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3242 - 3246

An Enhanced Technique for Secure Image Transmission Via Visual Cryptography and Secret Fragment Visible Mosaic Images

Rucha R. Raut, Prof. Komal B. Bijwe

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1526 - 1530

A New Meaningful Adaptive Region Incrementing Visual Secret Sharing Based on Error Diffusion and Permutation Encoding with Cheating Prevention

Anju Mohan

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 560 - 563

Survey of Cheating Prevention Techniques in Visual Cryptography

Smita Patil, Jyoti Rao

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 659 - 661

A Review of Anti Phishing Framework based on Visual Cryptography

D. N. Rewadkar, Asmita D. Abhyankar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1054 - 1058

Colour Extended Visual Cryptography based on MKGED

T. Anuradha, Dr. K. Usha Rani

Share this Article

Similar Articles with Keyword 'image captcha'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2313 - 2317

Enhanced Phishing Detection based on Image Differentiation

B. Jenny Jyoshna, Shaik Nyamathulla

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 852 - 855

An Efficient User Authentication using Captcha and Graphical Passwords-A Survey

S. Karthika, Dr. P. Devaki

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 3002 - 3005

Survey Paper on Genetically Optimized Face Image CAPTCHA

Juhi Shah, D. N. Rewadkar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 3, March 2013

Pages: 34 - 38

Countering Phishing Threats using Visual Cryptography

G. Pavithra, D. S. John Deva Prasanna

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 2, February 2014

Pages: 305 - 310

Anti Phishing using Visual Cryptography

Amit Navarkar, D. A. Phalke

Share this Article

Similar Articles with Keyword 'visual Cryptography Scheme'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 560 - 563

Survey of Cheating Prevention Techniques in Visual Cryptography

Smita Patil, Jyoti Rao

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2447 - 2449

Enhanced Security Providing using Visual Cryptography

Ketan Raju Kundiya, Ram B. Joshi

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2392 - 2395

Review on Implementation of Random Grid Visual Cryptoraphy for Color Images

Snehal N. Meshram, Sneha U. Bohra

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2545 - 2549

Implementation of Random Grid Visual Cryptography for Color Images

Snehal N. Meshram, Sneha U. Bohra

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2382 - 2385

Data Sharing through Multimedia Steganocryptic and Visual Cryptography System

Gajangi Rahul Kumar, U.Shivaji

Share this Article
Top