Fortification against Phishing Attack on Applications using Security Image based Captcha

M Nazreen Banu, K Vijayalakshmi, M Nazreen Banu, K Vijayalakshmi
2017 unpublished
This paper presents a new approach for providing qualified information only that is necessary for fund transfer during online shopping thereby safeguarding customer data and increasing customer morale and preventing identity thievery. A cryptographic technique based on visual furtive sharing used for image encryption. Using k out of n (k, n) visual secret sharing scheme an obscure image is encrypted in shares which are vague images that can be transmitted or distributed over a un trusted
more » ... cation channel. Only combining the k shares or more give the original obscure image. Phishing is an attempt by an individual or a group to thieve personal confidential information such as passwords, credit card information etc. from unsuspecting victims for identity thievery, financial hike and other fraudulent decomposing the original image captcha into two shares that are stored in separate activities .The use of images is explored to preserve the privacy of image captcha by database servers such that the original image captcha can be conceded only when both are simultaneously available; the identity of the original image captcha is not revealed by the individual sheet .Once the original image captcha is conceded to the user it security of the system. Moreover, the key element for this method is the generation algorithm of the honeywords such that they intend to be identical from the legitimate can be used as the password. Several solutions have been proposed to tackle phishing. In existing they analyze the honey word. Approach and give some remarks about the passwords. Therefore, they propose a new approach that uses passwords of other users in the system for honey sets, i.e. realistic honey words are provided word.
fatcat:wzdkiv32ivg4zcvxizfz4vqh2u