A Phishing Obligation Analysis on Web Based Secure Authentication

Authors

  • kumar D Department of computer science and engineering, Bharath University, Chennai
  • munot DK Department of computer science and engineering, Bharath University, Chennai
  • Anuradha C Department of computer science and engineering, Bharath University, Chennai

Keywords:

Phishing, image captcha, Visual Cryptography

Abstract

Phishing is an endeavor by a personal or a gaggle to snitch personal tip like passwords, master card info etc from unsuspecting victims for fraud, gain and different dishonorable activities. Visual cryptography could be a special form of secret sharing. In this paper we have projected a replacement approach for phishing websites classification to resolve the matter of phishing. Phishing websites comprise a spread of cues among its content-parts additionally because the browser-based security indicators provided beside the web site. the utilization of pictures is explored to preserve the privacy of image captcha by moldering the initial image captcha into 2 shares that are hold on in separate information servers specified the initial image captcha are often disclosed only each are at the same time available.

References

.De Santis, “Visual cryptography schemes with optimum part enlargement,” Theoretical Comput. Sci., vol. 369, nos. 1–3, pp. 169–182, Dec. 2006.

. Blundo, A. and A. De Santis, “Improved schemes for visual cryptography,” Des., Codes Cryptogr., vol. 24, no. 3, pp. 255–278, Dec. 2001.

. Blundo, P. D’Arco, A. De Santis, and D. R. Stinson, “Contrast optimum threshold visual cryptography schemes,” SIAM J. distinct maths., vol. 16, no. 2, pp. 224–261, 2003.

. Blundo and A. De Santis, “Visual cryptography schemes with smart reconstruction of black pixels,” J. Comput. Graph., vol. 22, pp. 449–455, Jan. 1998.

. Blundo, and D. R. Stinson, “On the excellence in visual cryptography schemes,” J. Cryptol., vol. 12, no. 4, pp. 261–289, Sep. 1999.

. C.-C. Chang, and H. B. Le, “Self-verify ingvisual secret sharing victimization error diffusion and interpolation techniques,” IEEE Trans. Inf. Forensics Security, vol. 4, no. 4, pp. 790–801, Dec. 2009.

. S.-K. Chen and S.-J. Lin, “Optimal (2, n) and (2,∞) visual secret sharing by generalized random grids,” J. Vis. Commun. Image Represent., vol. 23, no. 4, pp. 677–684, May 2012.

Downloads

Published

2024-02-26

How to Cite

kumar, D., munot, D. K., & Anuradha, C. (2024). A Phishing Obligation Analysis on Web Based Secure Authentication. COMPUSOFT: An International Journal of Advanced Computer Technology, 4(04), 1606–1608. Retrieved from https://ijact.in/index.php/j/article/view/280

Issue

Section

Original Research Article

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.