IJSRSET calls volunteers interested to contribute towards the scientific development in the field of Science, Engineering and Technology

Home > IJSRSET152237                                                     

Anti-Phishing Image Captcha Validation Scheme using Visual Cryptography


R Abinaya, S Janani, P Nathiya Devi
  • Abstract
  • Authors
  • Keywords
  • References
  • Details
Evolution in the world of internet has given rise to several online attacks and the most common attack is phishing. Victims are tricked into providing such information by a combination of spoofing techniques and social engineering. Phishing is an attempt by an individual or a group to acquire sensitive information such as usernames, passwords, and credit card details from unsuspecting victims. In this paper we have proposed a new approach named as "Anti-phishing image captcha validation scheme using visual cryptography" to solve the problem of phishing. Phishing websites are targeting the customers of banks and online payment services to steal sensitive data from victims. The use of images is explored to preserve the privacy of image captcha by decomposing the original image captcha into two shares that are stored in separate database servers such that the original image captcha can be revealed only when both are simultaneously available, the individual sheet images do not reveal the identity of the original image captcha. Once the original image captcha is revealed to the user it can be used as the password. Several solutions have been proposed to tackle phishing. Dynamically generating the captcha image by the system is one of the major advantage of the system. In this study, the authors shed light on the important features that distinguish phishing websites from legitimate ones and assess how good rule-based data mining classification techniques are in predicting phishing websites and which classification technique is proven to be more reliable.

R Abinaya, S Janani, P Nathiya Devi

Phishing, sensitive data, image captcha, visual cryptography


[1] OllmannG.The Phishing Guide Understanding & Preventing Phishing Attacks, NGS Software Insight Security Research.

[2] Roberto De Prisco and Alfredo De Santis., On the Relation of Random Grid and Deterministic Visual Cryptography.

[3] M. Naor and A. Shamir, “Visual cryptography,” in Proc. EUROCRYPT, 1994, pp. 1–12.

[4] A. Shamir, .How to Share a Secret, Communication ACM, vol. 22, 1979, pp. 612-613.

[5] G. R. Blakley, .Safeguarding Cryptographic Keys, Proceedings of AFIPS Conference, vol. 48, 1970, pp. 313-317.

[6] A. Menezes, P. Van Oorschot and S. Vanstone, .Handbook of Applied Cryptography,. CRC Press, Boca Raton, FL, 1997.

[7] Tzung-Her Chen; Chang-Sian Wu; Wei-Bin Lee,A Novel Subliminal Channel Found in Visual Cryptography and Its Application to Image Hiding.

[8] Hegde, C.; Manu, S.; DeepaShenoy, P.; Venugopal, K.R.; Patnaik, L.M. ,Secure Authentication using Image Processing and Visual Cryptography for Banking Applications.

[9] Jithi, P.V.; Nair, A.T.,Progressive visual cryptography with watermarking for meaningful shares.

[10] Kamath, M.; Parab, A.; Salyankar, A.; Dholay, S., Extended visual cryptography for color images using coding tables.

[11] Shuo-Fang Hsu; Yu-Jie Chang; Ran-Zan Wang; Yeuan-Kuen Lee; Shih-Yu Huang, Verifiable Visual Cryptography. 


Publication Details

Published in : Volume 1 | Issue 2 | March-April - 2015
Date of Publication Print ISSN Online ISSN
2015-04-25 2395-1990 2394-4099
Page(s) Manuscript Number   Publisher
86-90 IJSRSET152237   Technoscience Academy

Cite This Article

R Abinaya, S Janani, P Nathiya Devi, "Anti-Phishing Image Captcha Validation Scheme using Visual Cryptography", International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 1, Issue 2, pp.86-90, March-April-2015.
URL : http://ijsrset.com/IJSRSET152237.php