An Anti-Phishing Framework Based on Visual Cryptography

Page 1

International Research Journal of Engineering and Technology (IRJET)

e-ISSN: 2395 -0056

Volume: 04 Issue: 03 | Mar -2017

p-ISSN: 2395-0072

www.irjet.net

An Anti-phishing Framework Based on Visual Cryptography Bushra Siddique1, Upendra Malekar2, Mohini Kashyap3 1Student,

Dept. of CSE, Ballarpur Institute of Technology, MS, India Professor, Dept. of CSE, Ballarpur Institute of Technology, MS, India 3Student, Dept. of CSE, Ballarpur Institute of Technology, MS, India

2Assistant

---------------------------------------------------------------------***---------------------------------------------------------------------

Abstract - Due to immense use of internet, online attack has

learn information such as login or account information by masquerading as a reputable entity, IM or other communication channels. Another definition of phishing is given as the criminal activity done using social engineering.

increased. Among that, phishing attack is the most common one. Phishing is an act carried by an individual or a group to access personal information such as credit card details, passwords etc for financial gain and other fraudulent activities. Thus, a new method is proposed named as "An Antipishing framework based on visual cryptography" to solve phishing issues. In this paper, an image based authentication using visual cryptography (VC) is used. The use of visual cryptography is to preserve the privacy of an image captcha by decomposing the original image captcha into two sheets that are stored in separate database servers. The original image captcha can be revealed only when both are simultaneously available. Once the original image captcha is revealed to its user, it can be used as the password. Using this, websites can cross verify it and proves its identity.

The phishing done on the website is same as the fishing done in a lake, but in this phishing instead of stealing the fish the phisher steals the personal information of the users to commit crime. Thus, to overcome all this factors we are giving a technique to prevent phishing using visual cryptography. In this technique, a concept called image processing is used. Here, the image is given as an input and it is been processed in image processing thus generating the output as the improved or of the same characteristics of the original image. The concept of image processing is that an image can be spitted into any number of shares such that to get the original image, a particular number of shared must be combined.

Key Words: Image captcha, shares, visual cryptography, security, phishing.

2. RELATED WORK 1. INTRODUCTION

Phishing web pages are fake web pages that are created by phishers to imitate Web pages of real web site. This kind of web page has visual similarities to do fraud with their victims. Email is the most common way for doing this due to its easiness and simplicity. Phishers can send crafted emails to majority of the legitimate and can fool the users using the flaws in SMTP.

In today’s world, online transactions are very common and some leads to various online attacks. In this, the major security threat is the phishing attack and thus innovative ideas are coming with this every second. So, for this the preventive measurement should also be developed in a very effective manner. Therefore, the security for this should not be traceable easily.

To overcome all this, researchers have given different methods such as-

Now-a-days, majority of the applications is as secure as underlying system. As a result, it is not possible to be confident that the computer that is connected with the internet is a secure one or not. Phishing attack is also creating problems for e-commerce and online banking users. So, how to tackle with the application that needs high security.

1) Automated challenge Response method [1] is a method which provides authentication mechanisms. This method provides two way authentication and simplicity. This method also prevents man-inmiddle attacks. 2) There are also a DNS-based anti-phishing approach [2] technique that contains heuristic detection, blacklists and page similarity assessment. But these techniques to have some cons.

The main goal of the phished is to hack information such as credit card information, passwords etc from the users. Phishing is a form of fraud in which the attacker tries to

Š 2017, IRJET

|

Impact Factor value: 5.181

|

ISO 9001:2008 Certified Journal

|

Page 2186


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.