Anti-Phishing Image Captcha Validation Scheme using Visual Cryptography

Authors

  • R Abinaya  Department of Computer Science, Dhanalakshmi College of Engineering, Chennai, Tamilnadu, India
  • S Janani  Department of Computer Science, Dhanalakshmi College of Engineering, Chennai, Tamilnadu, India
  • P Nathiya Devi  Department of Computer Science, Dhanalakshmi College of Engineering, Chennai, Tamilnadu, India

Keywords:

Phishing, sensitive data, image captcha, visual cryptography

Abstract

Evolution in the world of internet has given rise to several online attacks and the most common attack is phishing. Victims are tricked into providing such information by a combination of spoofing techniques and social engineering. Phishing is an attempt by an individual or a group to acquire sensitive information such as usernames, passwords, and credit card details from unsuspecting victims. In this paper we have proposed a new approach named as "Anti-phishing image captcha validation scheme using visual cryptography" to solve the problem of phishing. Phishing websites are targeting the customers of banks and online payment services to steal sensitive data from victims. The use of images is explored to preserve the privacy of image captcha by decomposing the original image captcha into two shares that are stored in separate database servers such that the original image captcha can be revealed only when both are simultaneously available, the individual sheet images do not reveal the identity of the original image captcha. Once the original image captcha is revealed to the user it can be used as the password. Several solutions have been proposed to tackle phishing. Dynamically generating the captcha image by the system is one of the major advantage of the system. In this study, the authors shed light on the important features that distinguish phishing websites from legitimate ones and assess how good rule-based data mining classification techniques are in predicting phishing websites and which classification technique is proven to be more reliable.

References

[1] OllmannG.The Phishing Guide Understanding & Preventing Phishing Attacks, NGS Software Insight Security Research.

[2] Roberto De Prisco and Alfredo De Santis., On the Relation of Random Grid and Deterministic Visual Cryptography.

[3] M. Naor and A. Shamir, “Visual cryptography,” in Proc. EUROCRYPT, 1994, pp. 1–12.

[4] A. Shamir, .How to Share a Secret, Communication ACM, vol. 22, 1979, pp. 612-613.

[5] G. R. Blakley, .Safeguarding Cryptographic Keys, Proceedings of AFIPS Conference, vol. 48, 1970, pp. 313-317.

[6] A. Menezes, P. Van Oorschot and S. Vanstone, .Handbook of Applied Cryptography,. CRC Press, Boca Raton, FL, 1997.

[7] Tzung-Her Chen; Chang-Sian Wu; Wei-Bin Lee,A Novel Subliminal Channel Found in Visual Cryptography and Its Application to Image Hiding.

[8] Hegde, C.; Manu, S.; DeepaShenoy, P.; Venugopal, K.R.; Patnaik, L.M. ,Secure Authentication using Image Processing and Visual Cryptography for Banking Applications.

[9] Jithi, P.V.; Nair, A.T.,Progressive visual cryptography with watermarking for meaningful shares.

[10] Kamath, M.; Parab, A.; Salyankar, A.; Dholay, S., Extended visual cryptography for color images using coding tables.

[11] Shuo-Fang Hsu; Yu-Jie Chang; Ran-Zan Wang; Yeuan-Kuen Lee; Shih-Yu Huang, Verifiable Visual Cryptography. 

Downloads

Published

2015-04-25

Issue

Section

Research Articles

How to Cite

[1]
R Abinaya, S Janani, P Nathiya Devi, " Anti-Phishing Image Captcha Validation Scheme using Visual Cryptography, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 1, Issue 2, pp.86-90, March-April-2015.