scispace - formally typeset
Open AccessJournal ArticleDOI

An Efficient Approach for Phishing Website Detection using Visual Cryptography (VC) and Quick Response Code (QR Code)

TLDR
In this paper comparison of the paper with the existing system is done and how the method is more efficient is shown and also results are shown.
Abstract:Ā 
Phishing is an attack by a group or an individual to misuse personal information such as passwords, credit card information etc. for identity theft, financial gain and other fraudulent activities. In this paper image based (QR codes) authentication using Visual Cryptography (VC) is used. Visual cryptography is explored to convert the QR code into two shares and both these shares can then be transmitted separately. One Time Passwords (OTP) is passwords which are valid only for a session to validate the user within a specified amount of time. In this paper we are doing comparison of our paper with the existing system and show how our method is more efficient and also show our results. General Terms Visual cryptography, Grayscale, Threshold algorithm.

read more

Citations
More filters
Proceedings ArticleDOI

Online fraud transaction prevention system using extended visual cryptography and QR code

TL;DR: A new scheme for online fraud transaction prevention using extended visual cryptography and QR codes is proposed, which provides security for online users and detecting the phishing websites.
Journal ArticleDOI

Anti-Phishing framework based on Extended Visual Cryptography and QR code

TL;DR: A new authentication scheme for se-cure OTP distribution in phishing website detection through EVC and QR codes and an image based authentication using extended visual cryptography is implemented with the combination of OTP.
Book ChapterDOI

Phishing Site Detection and Blacklisting Using EVCS, Steganography Based on Android Application

TL;DR: In this article, a new scheme of detecting and preventing phishing sites was proposed using extended visual cryptography, steganography and android application, which reduces user interaction by auto-upload of shares and QR code details during authentication and this adds to security by reducing errors due to manual intervention.
Dissertation

Mobile User Authentication System for E-commerce Applications.

TL;DR: A Mobile User Authentication System (MUAS) that uses QR code technology to authenticate on-line users, through a challenge/response protocol that overcomes MITB attack, without compromising usability and ubiquity.
References
More filters

Visual Cryptography

Moni Naor, +1 more
TL;DR: In this paper, a new type of cryptographic scheme, which can decode concealed images without any cryptographic computations, is proposed, which is called k-out-of-n secret sharing.
Proceedings ArticleDOI

Decision strategies and susceptibility to phishing

TL;DR: Preliminary analysis of interviews with 20 non-expert computer users to reveal their strategies and understand their decisions when encountering possibly suspicious emails suggests that people can manage the risks that they are most familiar with, but don't appear to extrapolate to be wary of unfamiliar risks.
Posted Content

Security Issues on Cloud Computing.

TL;DR: This paper focuses on various security issues arising from the usage of Cloud services and especially by the rapid development of Cloud computing arena, and discusses basic security model followed by various High Level Security threats in the industry.
Journal ArticleDOI

Cloud Computing: Does Nirvana Hide behind the Nebula?

TL;DR: At the core of cloud computing is a simple concept: software as a service, or SaaS, but a complex concoction of paradigms, concepts, and technologies envelop cloud computing.
Book ChapterDOI

The Untrusted Computer Problem and Camera-Based Authentication

TL;DR: In this paper, the authentication problem is reduced to a simpler problem, in which the user carries a trusted device with her, and a description is given of two camera-based devices that are being developed.
Related Papers (5)