Secure Server Verification by using Encryption Algorithm and Visual Cryptography
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Research Proposals or Synopsis | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014

Secure Server Verification by using Encryption Algorithm and Visual Cryptography

Shreya Zarkar, Sayali Vaidya, Achal Bharambe, Arifa Tadvi, Tanashree Chavan

: In the area of the internet, various online attacks have been increased day by day and among them the most popular attack is phishing Which is done by hackers or unauthorized users. Phishing is an attempt by an individual or a group to acquire personal confidential information such as passwords, credit card information etc. from unsuspecting victims for identity theft, financial gain and other fraudulent activities. Hackers hosts similar website to misguide the user and store the confidential information of the user to their own website by providing link. Without proper safeguards, applications are vulnerable to various forms of security attack. Thus it is very important for the users to identify the fake and genuine website. Thus the online security is major part websites. In this paper we have proposed a new approach for the identification of genuine server named as Secure Server Verification by Using RSA Algorithm and Visual Cryptography to solve the problem of phishing. Here an image based authentication using Visual Cryptography (VC) is used and the encryption algorithm is used.

Keywords: phishing, authentication, security, theft, safeguard, confidential

Edition: Volume 3 Issue 12, December 2014

Pages: 310 - 313

Share this Article

How to Cite this Article?

Shreya Zarkar, Sayali Vaidya, Achal Bharambe, Arifa Tadvi, Tanashree Chavan, "Secure Server Verification by using Encryption Algorithm and Visual Cryptography", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB14323, Volume 3 Issue 12, December 2014, 310 - 313

64 PDF Views | 51 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'phishing'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 659 - 661

A Review of Anti Phishing Framework based on Visual Cryptography

D. N. Rewadkar, Asmita D. Abhyankar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2313 - 2317

Enhanced Phishing Detection based on Image Differentiation

B. Jenny Jyoshna, Shaik Nyamathulla

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2323 - 2328

An Enhanced Anti Phishing Approach Based on Threshold Value Differentiation

Komatla. Sasikala, P. Anitha Rani

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1117 - 1122

A Novel Approach for Phishing URLs Detection

Purva Agrawal, Dharmendra Mangal

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1488 - 1491

A Survey on: Email Security for Targeted Malicious Attacks

Jagdish R. Yadav, Dr. A. K. Srivastava

Share this Article

Similar Articles with Keyword 'authentication'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1347 - 1350

A QR-Code Authentication for Medical Image Access Environment

Inakollu Ramesh, K. B. V. Rama Narasimham

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2644 - 2649

Misbehavior Packet Detection Approach using Effective Trust in Delay-Tolerant Networks

Prerana S. Jagadale, Prashant Jawalkar

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2483 - 2487

Accountability of Data usage in Cloud Computing

Nitin P. Doiphode, Hemlata Channe

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1724 - 1727

Privacy Preserving Authenticity Framework for Shared Data Cloud Network

P. Vanitha Sree, K. Narayana Rao

Share this Article

Similar Articles with Keyword 'security'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1486 - 1489

Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System

Digvijay A. Patil, Yogesh B. Gurav

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1028 - 1031

Secure and Efficient Item Information Retrieval in Cloud Computing

Dr. Shameem Akther, Tahseen Begum

Share this Article

Similar Articles with Keyword 'theft'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 930 - 932

Effective Approach to Detection of Password File Using Honeywords

Dipali Dhumal, Shyam Gupta

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2178 - 2179

Blocking Misbehaving User & Activities in Social Network

Rashmi Gourkar, Garima Singh

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1701 - 1703

Multi-Server Authentication and Key Exchange

Muzammil M. Ahmad

Share this Article

Research Proposals or Synopsis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 310 - 313

Secure Server Verification by using Encryption Algorithm and Visual Cryptography

Shreya Zarkar, Sayali Vaidya, Achal Bharambe, Arifa Tadvi, Tanashree Chavan

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1324 - 1327

Vehicle Theft Identification RIFD Based Vehicle ID Detection in a Wireless Charging Applications

Basit Sayeed Qadri, Faiq Basu, N. Priya

Share this Article

Similar Articles with Keyword 'safeguard'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1960 - 1964

A Survey on Present State of the Art of Intrusion Detection Systems in MANETs: Finding Research Gaps

V. L. Pavani, Prof. B. Sathyanarayana

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2451 - 2458

Regenerating Code Based on Public Auditing Scheme with Security Preserving for Cloud Storage

Dr. K. Sundeep Kumar, Anupama P. V

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1204 - 1208

Privacy-Preserving Public Auditing for Secure Cloud Storage using ElGamal Public Key Encryption Algorithm

Rahul Vijay Badhe, Shriniwas Gadage

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 2262 - 2266

A Framework of Privacy Preserving QOS Prediction used for Web Service Recommendation

Bhakti Chudiwal, P. Jawalkar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1200 - 1203

An Efficient Data Search in Cloud Computing Using Search Algorithm for Ranked Algorithm

A. Boobesh, Pradeepa Devapriya

Share this Article

Similar Articles with Keyword 'confidential'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1028 - 1031

Secure and Efficient Item Information Retrieval in Cloud Computing

Dr. Shameem Akther, Tahseen Begum

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1303 - 1306

Survey on Privacy Preservation of Sensitive Data

Uma Ashok Huljanti, Dr. Srinivas Narasim Kini

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014

Pages: 815 - 819

An Approach for Secure Data Storage Services in Cloud Computing

S. Srinivas, Martha Sheshikala, Duvvada Rajeswara Rao

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1525 - 1527

To Secure Query Services in the Cloud with RASP Data Perturbation

Puja Bhaganagarkar, Dhanshree Kulkarni

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2352 - 2357

RS and OFDM Methods Over Encrypted and Data Embedded Video Streams

Jithya J. Prakash, Hemand E. P.

Share this Article
Top