Documente Academic
Documente Profesional
Documente Cultură
ABSTRACT
In todays world of internet, various online attacks has
been increased as well as spread and among them the
most famous and harmful attack is phishing. it is trying
by an individual person or a group to get personal secret
confidential information such as passwords, all types of
card information from unsuspecting victims for identity
theft, financial gain and other stolen activities. Fake
websites which appear very like to the original ones are
being hosted to gain this. Here an image based
authentication
using
Visual
Cryptography
is
implemented. The use of visual cryptography is traverse
to preserve the privacy of an image captcha by
decomposing means that original image captcha into two
shares (known as sheets) that are generated by bank
server. Original image captcha can be betrayed only
when both are simultaneously available. the individual
sheet images do not betray the identity of the original
image captcha. Once the original image captcha is
passed to the user it can be used as the password by user.
Using this website cross verifies its identity and proves
that it is a genuine website before the end users.by Using
(2,2) visual secret sharing scheme a secret image is
encrypted in shares which are meaningless images that
can be transmitted or distributed over an untrusted
communication channel.
II.
PHISHING
I.
INTRODUCTION
Effects of Phishing:
There are two main effect of phishing:
Inflicts financial losses
Corrodes consumer trust
There are so many phishing techniques.
Email / Spam
Web Based Delivery
Instant Messaging
Trojan Hosts
17
www.ijete.org
VISUAL CRYPTOGRAPHY
IV.
ARCHITECTURE
www.ijete.org
V.
CONCLUSION
REFERENCES
Visual Content-Based
Approach.
2011.
Anti-Phishing:
Bayesian