Phishing Detection Using Visual Cryptography

Authors

  • Deepshika D. J.  UG Scholar, Dhanalakshmi College of Engineering, Tamilnadu, India
  • Murugesan M   Associate Professor, Dhanalakshmi College of Engineering, Tamilnadu, India

DOI:

https://doi.org//10.32628/IJSRST196248

Keywords:

Phishing Websites, Visual Cryptography, Image Processing, Antiphishing.

Abstract

Phishing is an attempt by an individual or a group to thieve personal confidential information such as passwords, credit card information etc from unsuspecting sufferer for burglary, financial gain and other criminal activities. The first defense should be strengthening the authentication mechanism in a web application. A simple username and password based authentication is not sufficient for web sites providing critical financial transactions. Here we have advised a new way for phishing websites classification to solve the problem of phishing. Phishing websites involves a collection of key within its content-parts as well as the browser-based security indicators provided along with the website. The use of images is try to keep the privacy of image captcha by dissolve the original image captcha into two shares that are stored in separate database servers such that the original image captcha can be acknowledged only when both are available together the individual sheet images do not confess the status of the original image captcha. Once the original image captcha is announced to the user it can be used as the password. Several solutions have been suggested to handle phishing.

References

  1. A. N. V. Sunil and A. Sardana, “A pagerank based detection technique for phishing web sites,” in Computers & Informatics (ISCI), 2012 IEEE Symposium on. IEEE, 2012, pp. 58-63.
  2. B. B. Gupta, A. Tewari, A. K. Jain, and D. P. Agrawal, “Fighting against phishing attacks: state of the art and future challenges,” in Neural Computing and Applications, 2016.
  3. H. Zhang, G. Liu, T. W. Chow, and W. Liu, “Textual and visual content-based anti-phishing: a bayesian approach,” Neural Networks, IEEE Transactions on, vol. 22, no. 10, pp. 1532-1546, 2011.
  4. I. Stojmenovic and S. Wen, “The fog computing paradigm: Scenarios and security issues,” in Computer Science and Information Systems (FedCSIS), 2014 Federated Conference on. IEEE, pp. 1-8.
  5. J.-S. R. Jang, “Anfis: adaptive-network-based fuzzy inference system,” Systems, Man and Cybernetics, IEEE Transactions on, vol. 23, no. 3, pp. 665-685, 1993.
  6. J.-S. Jang and C.-T. Sun, “Neuro-fuzzy modeling and control,” Proceedings of the IEEE, vol. 83, no. 3, pp. 378-406, 1995.
  7. L. Wenyin, G. Liu, B. Qiu, and X. Quan, “Antiphishing through phishing target discovery,” IEEE Internet Computing, vol. 16, no. 2, pp. 52-61, March 2012.
  8. L. Wenyin, G. Huang, L. Xiaoyue, X. Deng, and Z. Min, “Phishing web page detection,” in Document Analysis and Recognition, 2005. Proceedings. Eighth International Conference on. IEEE, pp. 560-564.
  9. S. Sheng, B. Wardman, G. Warner, L. F. Cranor, J. Hong, and C. Zhang, “An empirical analysis of phishing blacklists,” in Proceedings of Sixth Conference on Email and Anti-Spam (CEAS), 2009.
  10. Y. Li and M. Chen, “Software-Defined Network Function Virtualization: A Survey,” IEEE Access, vol. 3, pp. 2542-2553, 2015.

Downloads

Published

2019-04-30

Issue

Section

Research Articles

How to Cite

[1]
Deepshika D. J., Murugesan M , " Phishing Detection Using Visual Cryptography , International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 6, Issue 2, pp.277-286, March-April-2019. Available at doi : https://doi.org/10.32628/IJSRST196248