Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology
ISSN: 2321-3337 Impact Factor:1.521 Volume:6 Issue:1 Year: 05 July,2016 Pages:1097-1100
Phishing is deceptive attempt that targets an individual or an organization, seeking unauthorized access to confidential data or personal credentials such as credit card information, passwords etc. by an individual that poses as a reputable entity or person. It has become a stern threat to companies that deal with E-transactions. If these threats cannot be ceased, people cannot trust online transactions that include authentication over credentials. In the project, we have used an image-based authentication using Visual Cryptography (VC).The integrity of the secret image is maintained by dividing the secret image into two splits using VC, one is stored in server side database and other is given to the user such that the Secret Image can be recognized only when both the splits are concurrently available. The technique of both image processing and a cryptography is used in my project. Image processing is a technique to transform the secret image into digital form and carry out some operation on it, in a visual cryptography the Secret Image is splitting into splits and is kept in the server database, after login by the user, the Secret Image should get a match with its content behind the image. After both user and server side shares get matched, the user can login into the website very securely.
Phishing, Visual Cryptography, Secret Image, Shares, and Security.
tahaamateen@yahoo.com