Research Article

An Efficient Approach for Phishing Website Detection using Visual Cryptography (VC) and Quick Response Code (QR code)

by  Dhanashree Moholkar, Namrata Kadam, Damini Deokar, Ashwini Kute, Sonali Kadam
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 115 - Issue 12
Published: April 2015
Authors: Dhanashree Moholkar, Namrata Kadam, Damini Deokar, Ashwini Kute, Sonali Kadam
10.5120/20203-2456
PDF

Dhanashree Moholkar, Namrata Kadam, Damini Deokar, Ashwini Kute, Sonali Kadam . An Efficient Approach for Phishing Website Detection using Visual Cryptography (VC) and Quick Response Code (QR code). International Journal of Computer Applications. 115, 12 (April 2015), 13-16. DOI=10.5120/20203-2456

                        @article{ 10.5120/20203-2456,
                        author  = { Dhanashree Moholkar,Namrata Kadam,Damini Deokar,Ashwini Kute,Sonali Kadam },
                        title   = { An Efficient Approach for Phishing Website Detection using Visual Cryptography (VC) and Quick Response Code (QR code) },
                        journal = { International Journal of Computer Applications },
                        year    = { 2015 },
                        volume  = { 115 },
                        number  = { 12 },
                        pages   = { 13-16 },
                        doi     = { 10.5120/20203-2456 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2015
                        %A Dhanashree Moholkar
                        %A Namrata Kadam
                        %A Damini Deokar
                        %A Ashwini Kute
                        %A Sonali Kadam
                        %T An Efficient Approach for Phishing Website Detection using Visual Cryptography (VC) and Quick Response Code (QR code)%T 
                        %J International Journal of Computer Applications
                        %V 115
                        %N 12
                        %P 13-16
                        %R 10.5120/20203-2456
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Phishing is an attack by a group or an individual to misuse personal information such as passwords, credit card information etc. for identity theft, financial gain and other fraudulent activities. In this paper image based (QR codes) authentication using Visual Cryptography (VC) is used. Visual cryptography is explored to convert the QR code into two shares and both these shares can then be transmitted separately. One Time Passwords (OTP) is passwords which are valid only for a session to validate the user within a specified amount of time. In this paper we are doing comparison of our paper with the existing system and show how our method is more efficient and also show our results.

References
  • J. S. Downs, M. B. Holbrook, Decision strategies and susceptibility to phishing, in: Proc. the second symposium on usable privacy and security(SOUPS 2006), pp. 79-90.
  • Clarke, Dwaine; Gassend, Blaise; Kotwal, Thomas; Burnside, Matt; van Dijk, Marten: "The Untrusted Computer Problem and Camera-Based Authentication". Lecture Notes in Computer Science, 2002, Volume 2414, Pervasive Computing, Pages 114-124, Jan. 2002.
  • Denso-wave:http://www. denso-wave. com/qrcode/index-e. html
  • Lee, Jaesik; Cho, Chang-Hyun; Jun, Moon-Seog: "Secure quick response-payment(QR- Pay) system using mobile device". Advanced Communication Technology (ICACT), 2011 13th International Conference, Feb. 2011.
  • I. Bose, A. C. M. Leung, Unveiling the mask of phishing: threats, preventive measures and responsibilities Communications of the Association for Information Systems 19 (24) (2007) 544-566.
  • Google Inc, Google safe browsing for Firefox, http://www. google. com/tools/firefox/ safe browsing/
  • Saurab K Prashar. "Security issues in cloud computing" , serl . iit. ac. in/cs6600/saurabh. ppt
  • M. Naor and A. Shamir, "Visual cryptography," Proceedings of Advances in Cryptology: Eurocrypt94, Lecture Notes in Computer Science, Vol. 950, pp. 1 - 12, 1995. H. Erdogmus, "Cloud Computing: Does Nirvana Hide behind the Nebula? " IEEE Software, vol. 26, no. 2, pp. 4-6 ,2009
  • Y. S. Dai, Y. P. Xiang, G. W. Zhang. , "Self-Healing and Hybrid Diagnosis in Cloud Computing, " Lecture Notes of Computer Science(LNCS), vol. 5931, pp. 45-56,2009.
  • Amazon Elastic Compute Cloud [URL]. http://aws. amazon. com/ec2, acess on Oct. 2009.
  • Felt, Adrienne Porter; Wagner, David: "Phishing on Mobile Devices". Workshop on Web 2. 0 Security and Privacy (W2SP), 2011
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

OTP Phishing QR code Shares Visual Cryptography .

Powered by PhDFocusTM