An Efficient Approach for Phishing Website Detection using Visual Cryptography (VC) and Quick Response Code (QR Code)
TLDR
In this paper comparison of the paper with the existing system is done and how the method is more efficient is shown and also results are shown.Abstract:Ā
Phishing is an attack by a group or an individual to misuse personal information such as passwords, credit card information etc. for identity theft, financial gain and other fraudulent activities. In this paper image based (QR codes) authentication using Visual Cryptography (VC) is used. Visual cryptography is explored to convert the QR code into two shares and both these shares can then be transmitted separately. One Time Passwords (OTP) is passwords which are valid only for a session to validate the user within a specified amount of time. In this paper we are doing comparison of our paper with the existing system and show how our method is more efficient and also show our results. General Terms Visual cryptography, Grayscale, Threshold algorithm.read more
Citations
More filters
Proceedings ArticleDOI
Online fraud transaction prevention system using extended visual cryptography and QR code
Shubhangi Khairnar,Reena Kharat +1 more
TL;DR: A new scheme for online fraud transaction prevention using extended visual cryptography and QR codes is proposed, which provides security for online users and detecting the phishing websites.
Journal ArticleDOI
Anti-Phishing framework based on Extended Visual Cryptography and QR code
TL;DR: A new authentication scheme for se-cure OTP distribution in phishing website detection through EVC and QR codes and an image based authentication using extended visual cryptography is implemented with the combination of OTP.
Book ChapterDOI
Phishing Site Detection and Blacklisting Using EVCS, Steganography Based on Android Application
TL;DR: In this article, a new scheme of detecting and preventing phishing sites was proposed using extended visual cryptography, steganography and android application, which reduces user interaction by auto-upload of shares and QR code details during authentication and this adds to security by reducing errors due to manual intervention.
Dissertation
Mobile User Authentication System for E-commerce Applications.
TL;DR: A Mobile User Authentication System (MUAS) that uses QR code technology to authenticate on-line users, through a challenge/response protocol that overcomes MITB attack, without compromising usability and ubiquity.
References
More filters
Visual Cryptography
Moni Naor,Adi Shamir +1 more
TL;DR: In this paper, a new type of cryptographic scheme, which can decode concealed images without any cryptographic computations, is proposed, which is called k-out-of-n secret sharing.
Proceedings ArticleDOI
Decision strategies and susceptibility to phishing
TL;DR: Preliminary analysis of interviews with 20 non-expert computer users to reveal their strategies and understand their decisions when encountering possibly suspicious emails suggests that people can manage the risks that they are most familiar with, but don't appear to extrapolate to be wary of unfamiliar risks.
Posted Content
Security Issues on Cloud Computing.
TL;DR: This paper focuses on various security issues arising from the usage of Cloud services and especially by the rapid development of Cloud computing arena, and discusses basic security model followed by various High Level Security threats in the industry.
Journal ArticleDOI
Cloud Computing: Does Nirvana Hide behind the Nebula?
TL;DR: At the core of cloud computing is a simple concept: software as a service, or SaaS, but a complex concoction of paradigms, concepts, and technologies envelop cloud computing.
Book ChapterDOI
The Untrusted Computer Problem and Camera-Based Authentication
Dwaine Clarke,Blaise Gassend,Thomas Kotwal,Matthew Burnside,Marten van Dijk,Srinivas Devadas,Ronald L. Rivest +6 more
TL;DR: In this paper, the authentication problem is reduced to a simpler problem, in which the user carries a trusted device with her, and a description is given of two camera-based devices that are being developed.