A Novel Antiphishing Frame Work on Cloud Based on Visual Cryptography

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
© 2016 by IJETT Journal
Volume-35 Number-11
Year of Publication : 2016
Authors : TusharRaveker, ShreyasSiddh, RizwanShaikh, SanketSugaonkar, Prof. S.S. Vanjire
DOI :  10.14445/22315381/IJETT-V35P305


TusharRaveker, ShreyasSiddh, RizwanShaikh, SanketSugaonkar, Prof. S.S. Vanjire"A Novel Antiphishing Frame Work on Cloud Based on Visual Cryptography", International Journal of Engineering Trends and Technology (IJETT), V35(11),520-524 May 2016. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

Phishing is kind of attack which become popular in recent years . Using phishing attack, attackers can theft the identity of victim by stealing password and other confidential information. Phishing attack mainly used to obtain bank related information which used to gain financial benefits. It has become a serious threat to enterprises that deal with financial transactions. These threats is need to be addressed because increasing used of internet for transactions and banking Many solutions came to solve this kind of identity theft. To solve the problem of phishing, a framework is proposed based on Visual Cryptography on cloud. In this framework individual can decide whether site is phished or not before entering into sites network. In this framework at the time of registration user enter information, using this information it produces image which is encrypted into two portions that are kept in different database servers (with user and server) such that the original image can be asserted only when both are simultaneously accessible. Once the original image is asserted to the user it can be used for authentication. Hence user can know the site is real or not based on this information. This type of website crosschecks its identity and manifests that it is a legitimate website before the end users.


[1] Ollmann G., “The Phishing Guide Understanding & Preventing Phishing Attacks”, NGS Software Insight Security Research, IBM Global Technology Services.
[2] M. Naor and A. Shamir, “Visual Cryptography,” Advances in Cryptology EUROCRYPT, 1994, Proceeding, LNCS vol. 950, Springer-Verlag, 1995, pp. 1–12.
[3] G. R. Blakley, “Safeguarding Cryptographic Keys”, Proceedings of AFIPS Conference, vol. 48, 1970, pp. 313- 317.
[4] B. Borchert, “Segment Based Visual Cryptography”, WSI Press, Germany, 2007.
[5] W-Q Yan, D. Jin and M. S. Kanakanahalli, “Visual Cryptography for Print and Scan Applications”, IEEE Transactions, ISCAS-2004, pp.572-575.
[6] T. Monoth and A. P. Babu, “Recursive Visual Cryptography Using Random Basis Column Pixel Expansion”, In Proceedings of IEEE International Conference on Information Technology, 2007, pp. 41-43.
[7] C. Blundo and A. De Santis, “On the contrast in Visual Cryptography Schemes”, In Journal on Cryptography, vol. 12, 1999, pp. 261-289.
[8] C. M. Hu and W. G. Tzeng, “Cheating Prevention in Visual Cryptography”, IEEE Transaction on Image Processing, vol. 16, no. 1, Jan-2007, pp.36-45.
[9] S. S. Hegde, BhaskarRao, “Cloud Security Using Visual Cryptography”, International Journal of Distributed and Parallel Systems (IJDPS) Vol.3, No.1, January 2012,pp.9- 13.
[10] Sian-Jheng Lin and Wei-Ho Chung, “A Probabilistic Model of (t,n) Visual Cryptography Scheme With Dynamic Group”, IEEE Transactions on Information Forensics and Security, vol. 7, No. 1, February 2012, pp.197-207.

Share, superposition, grayscale, visualcryptography.