CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Anti-Phishing framework based on Extended Visual Cryptography and QR code

by Shubhangi Khairnar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 142 - Number 5
Year of Publication: 2016
Authors: Shubhangi Khairnar
10.5120/ijca2016909794

Shubhangi Khairnar . Anti-Phishing framework based on Extended Visual Cryptography and QR code. International Journal of Computer Applications. 142, 5 ( May 2016), 25-28. DOI=10.5120/ijca2016909794

@article{ 10.5120/ijca2016909794,
author = { Shubhangi Khairnar },
title = { Anti-Phishing framework based on Extended Visual Cryptography and QR code },
journal = { International Journal of Computer Applications },
issue_date = { May 2016 },
volume = { 142 },
number = { 5 },
month = { May },
year = { 2016 },
issn = { 0975-8887 },
pages = { 25-28 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume142/number5/24894-2016909794/ },
doi = { 10.5120/ijca2016909794 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:44:10.999113+05:30
%A Shubhangi Khairnar
%T Anti-Phishing framework based on Extended Visual Cryptography and QR code
%J International Journal of Computer Applications
%@ 0975-8887
%V 142
%N 5
%P 25-28
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Nowadays Online transactions are become very common and there are various attacks occur behind this. In these types of various attacks, phishing is very common attack. For detecting this attack various anti-phishing mechanisms are used. Propose a new authentication scheme for se-cure OTP distribution in phishing website detection through EVC and QR codes. The Website Detection using extended visual cryptography (EVC) technique and OTP to solve the problem of phishing. Here an image based authentication using extended visual cryptography is implemented with the combination of OTP (One Time Password). Image based QR codes authentication using EVC is used. The use of secret sharing technique is discovered to convert the QR code into two shares and both these shares can then be transmitted separately. One Time Passwords (OTP) is passwords which are valid only for a session to validate the user within a specified amount of time. The system provides high security requirements of the online users and protects them against various security attacks. Also the system is very user-friendly. It is reliable method for detecting phishing websites.

References
  1. M. Noar, A. Shamir, “Visual cryptography,” in: A. De Santis (Ed.),Advance in Cryptography: Eurpocrypt’94, Lecture Notes in Computer Science, Volume. 950, pp. 1-12, 1955.
  2. Divya James, Mintu Philip, “A Novel Anti Phishing framework based on Visual Cryptography’ 978-1-4673-0449-8/12/$31.00 ©2012 IEEE.
  3. J.W. Ragucci and S. A. Robila, “Societal Aspects of Phishing, in technology and Society, 2006. ISTAS 2006. IEEE International Symposium on, 2006, pp. 1 –5.
  4. M. Aburrous, M. A. Hossain, K. Dahal, and F. Thabtah, “Experimental Case Studies for Investigating E-Banking Phishing Techniques and Attack Strategies,” Cognitive Computation, vol. 2, no. 3, pp. 242–253, Apr. 2010.
  5. Souvik Roy and P. Venkateswaran, "Online Payment System using Steganography and Visual Cryptography," 2014 IEEE Students’ Conference on Electrical, Electronics and Computer Science
  6. Giuseppe Ateniese, Carlo Blundo,” Extended Capabilities for Visual Cryptography”, Department of combinatorics and Optimization University of waterloo, N2L, 3G1, Canada.
  7. A. Alnajim and M. Munro, “An anti-phishing approach that uses training intervention for Phishing websites detection,” in Proceedings of the 2009 Sixth International Conference on Information Technology: New Generations. Washington, DC, USA: IEEE Computer Society, 2009, pp. 405–410.
  8. J.S. Downs, M. B. Holbrook and L. F. Cranor, “Decision strategies and susceptibility to phishing”. Proc. the 2nd symposium on usable privacy and security. New York, USA: ACM Press, 2006, pp. 79 – 90.
  9. M. Chandrasekaran, R. Chinchani and S. Upadhyaya,“PHONEY: Mimicking User Response to Detect Phishing Attacks”. Proc. International Symposium on a World of Wireless, Mobile and Multimedia Networks. Washington DC: IEEE Computer Society, 2006, pp. 668-672.
  10. C.C. Wu, L.H. Chen, “A Study On Visual Cryptography”, Master Thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, R.O.C., 1998.
  11. Kajal NanawareȦ, Kirti KanadeȦ, “Malicious Website Detection using Visual Cryptography and OTP”, International Journal of Current Engineering and Technology, Vol.4, No.5 (Oct 2014)
  12. S.Premkumar, A.E.Narayanan, “New Visual Steganography Scheme for Secure Banking Application,” Proceeding of 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET), pp. 1013 – 1016, Kumaracoil, India, 2012.
  13. D. R. Anekar, Binay Rana, Vishal Jhangiani," Online Banking Security System Using OTP Encoded in QR-Code ", 2015, IJARCSSE
  14. Dhanashree Moholkar ,”An Efficient Approach for Phishing Website Detection using Visual Cryptography (VC) and Quick Response Code (QR Code)”, International Journal of Computer Applications (0975 – 8887) Volume 115 – No. 12, April 2015
  15. Gaurav Palande, Shekhar Jadhav,” An Enhanced Anti-Phishing Framework Based on Visual Cryptography”, International Journal of Emerging Research in Management &Technology ISSN: 2278-9359 (Volume-3, Issue-3)
Index Terms

Computer Science
Information Sciences

Keywords

OTP Phishing QR Extended visual cryptography.