CFP last date
20 December 2024
Reseach Article

An Efficient Approach for Phishing Website Detection using Visual Cryptography (VC) and Quick Response Code (QR code)

by Dhanashree Moholkar, Namrata Kadam, Damini Deokar, Ashwini Kute, Sonali Kadam
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 115 - Number 12
Year of Publication: 2015
Authors: Dhanashree Moholkar, Namrata Kadam, Damini Deokar, Ashwini Kute, Sonali Kadam
10.5120/20203-2456

Dhanashree Moholkar, Namrata Kadam, Damini Deokar, Ashwini Kute, Sonali Kadam . An Efficient Approach for Phishing Website Detection using Visual Cryptography (VC) and Quick Response Code (QR code). International Journal of Computer Applications. 115, 12 ( April 2015), 13-16. DOI=10.5120/20203-2456

@article{ 10.5120/20203-2456,
author = { Dhanashree Moholkar, Namrata Kadam, Damini Deokar, Ashwini Kute, Sonali Kadam },
title = { An Efficient Approach for Phishing Website Detection using Visual Cryptography (VC) and Quick Response Code (QR code) },
journal = { International Journal of Computer Applications },
issue_date = { April 2015 },
volume = { 115 },
number = { 12 },
month = { April },
year = { 2015 },
issn = { 0975-8887 },
pages = { 13-16 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume115/number12/20203-2456/ },
doi = { 10.5120/20203-2456 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:54:38.812360+05:30
%A Dhanashree Moholkar
%A Namrata Kadam
%A Damini Deokar
%A Ashwini Kute
%A Sonali Kadam
%T An Efficient Approach for Phishing Website Detection using Visual Cryptography (VC) and Quick Response Code (QR code)
%J International Journal of Computer Applications
%@ 0975-8887
%V 115
%N 12
%P 13-16
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Phishing is an attack by a group or an individual to misuse personal information such as passwords, credit card information etc. for identity theft, financial gain and other fraudulent activities. In this paper image based (QR codes) authentication using Visual Cryptography (VC) is used. Visual cryptography is explored to convert the QR code into two shares and both these shares can then be transmitted separately. One Time Passwords (OTP) is passwords which are valid only for a session to validate the user within a specified amount of time. In this paper we are doing comparison of our paper with the existing system and show how our method is more efficient and also show our results.

References
  1. J. S. Downs, M. B. Holbrook, Decision strategies and susceptibility to phishing, in: Proc. the second symposium on usable privacy and security(SOUPS 2006), pp. 79-90.
  2. Clarke, Dwaine; Gassend, Blaise; Kotwal, Thomas; Burnside, Matt; van Dijk, Marten: "The Untrusted Computer Problem and Camera-Based Authentication". Lecture Notes in Computer Science, 2002, Volume 2414, Pervasive Computing, Pages 114-124, Jan. 2002.
  3. Denso-wave:http://www. denso-wave. com/qrcode/index-e. html
  4. Lee, Jaesik; Cho, Chang-Hyun; Jun, Moon-Seog: "Secure quick response-payment(QR- Pay) system using mobile device". Advanced Communication Technology (ICACT), 2011 13th International Conference, Feb. 2011.
  5. I. Bose, A. C. M. Leung, Unveiling the mask of phishing: threats, preventive measures and responsibilities Communications of the Association for Information Systems 19 (24) (2007) 544-566.
  6. Google Inc, Google safe browsing for Firefox, http://www. google. com/tools/firefox/ safe browsing/
  7. Saurab K Prashar. "Security issues in cloud computing" , serl . iit. ac. in/cs6600/saurabh. ppt
  8. M. Naor and A. Shamir, "Visual cryptography," Proceedings of Advances in Cryptology: Eurocrypt94, Lecture Notes in Computer Science, Vol. 950, pp. 1 - 12, 1995. H. Erdogmus, "Cloud Computing: Does Nirvana Hide behind the Nebula? " IEEE Software, vol. 26, no. 2, pp. 4-6 ,2009
  9. Y. S. Dai, Y. P. Xiang, G. W. Zhang. , "Self-Healing and Hybrid Diagnosis in Cloud Computing, " Lecture Notes of Computer Science(LNCS), vol. 5931, pp. 45-56,2009.
  10. Amazon Elastic Compute Cloud [URL]. http://aws. amazon. com/ec2, acess on Oct. 2009.
  11. Felt, Adrienne Porter; Wagner, David: "Phishing on Mobile Devices". Workshop on Web 2. 0 Security and Privacy (W2SP), 2011
Index Terms

Computer Science
Information Sciences

Keywords

OTP Phishing QR code Shares Visual Cryptography .