Call for Paper - March 2023 Edition
IJCA solicits original research papers for the March 2023 Edition. Last date of manuscript submission is February 20, 2023. Read More

Antiphishing Model with URL & Image based Webpage Matching

IJCA Proceedings on International Conference and workshop on Emerging Trends in Technology (ICWET 2012)
© 2012 by IJCA Journal
icwet2012 - Number 6
Year of Publication: 2012
Madhuri S. Arade
P.C. Bhaskar

Madhuri S Arade, P C Bhaskar and R.K.Kamat. Article: Antiphishing Model with URL & Image based Webpage Matching. IJCA Proceedings on International Conference and workshop on Emerging Trends in Technology (ICWET 2012) icwet(6):18-24, March 2012. Full text available. BibTeX

	author = {Madhuri S. Arade and P.C. Bhaskar and R.K.Kamat},
	title = {Article: Antiphishing Model with URL & Image based Webpage Matching},
	journal = {IJCA Proceedings on International Conference and workshop on Emerging Trends in Technology (ICWET 2012)},
	year = {2012},
	volume = {icwet},
	number = {6},
	pages = {18-24},
	month = {March},
	note = {Full text available}


Phishing is a form of online identity theft associated with both social engineering and technical subterfuge and a major threat to information security and personal privacy. Many anti-phishing solutions, such as content analysis and HTML code analysis, rely on this property to detect fake web pages. However, these techniques failed, as phishers are now composing phishing pages with non-analyzable elements, such as images and flash objects. This paper proposes a new phishing detection scheme based on an URL domain identity & webpage image matching. At first, it identifies the similar authorized URL, using divide rule approach and approximate string matching algorithm. For this similar URL and input URL, the IP addresses will be identified. If their IP addresses doesn’t match with each other, then it could be phishing URL and phase-I phishing report will be generated. Then, this suspected URL’s webpage snapshot will be treated as an image during phase-II. In phase-II, keypoints will be detected and their features will be extracted. These features will be extracted using CCH descriptor. Then, match this suspected image features with the features of authorized webpage. If this matching crosses threshold value, then this webpage is phishing one. At last, final phishing report will be generated. As the combined approach of URL domain identity and webpage image matching used, it performs better than other existing tools.


  • The Anti-Phishing Working Group,APWG Phishing Trends-Reports, Archive.html
  • Jason Milletary, Technical Trends in Phishing Attacks, Carnegie Mellon University,2005
  • Sumit Siddharth, Anti Spamming Techniques.pdf.
  • P. Robichaux and D.L. Ganger, Gone Phishing: Evaluating Antiphishing Tools for Windows, 3Sharp Project Report, Sept. 2006; projects/antiphishing/.
  • C. Ludl et al., On the Effectiveness of Techniques to Detect Phishing Sites, Proc. Detection of Intrusions and Malware, and Vulnerability Assessment, LNCS 4579, Springer, 2007, pp. 20–39
  • W. Liu et al., An Antiphishing Strategy Based on Visual Similarity Assessment, IEEE Internet Computing, vol. 10, no. 2, 2006, pp. 58–65
  • L. Wenyin et al., Detection of Phishing Webpages Based on Visual Similarity,Proc. World Wide Web Conf. (special interest tracks and posters), A. Ellis and T. Hagino, eds., ACM Press, 2005, pp. 1060–1061.
  • IEEE 2009 Paper on Fighting Phishing with Discriminative Keypoint Features by K. J. Lin, Yan Wang.
  • J. Han and M. Kamber,Data Mining: Concepts and Techniques, Morgan Kaufmann, 2000.
  • C.-R. Huang, C.-S. Chen, and P.-4. C. Chung, ContrastContext Histogram — An Efficient Discriminating Local Descriptor for Object Recognition and Image Matching,Pattern Recognition, vol. 41, no. 10, 2008, pp.3071–3077;