A NOVEL ANTI PHISHING
FRAMEWORK BASED ON VISUAL CRYPTOGRAPHY
ABSTRACT:
Phishing is
an attempt by an individual or a group to thieve personal confidential
information such as passwords, credit card information etc from unsuspecting
victims for identity theft, financial gain and other fraudulent activities. In
this paper we have proposed a new approach named as "A Novel Antiphishing framework
based on visual cryptography" to solve the problem of phishing. Here an
image based authentication using Visual Cryptography (vc) is used. The use of
visual cryptography is explored to preserve the privacy of image captcha by
decomposing the original image captcha into two shares that are stored in
separate database servers such that the original image captcha can be revealed
only when both are simultaneously available; the individual sheet images do not
reveal the identity of the original image captcha. Once the original image
captcha is revealed to the user it can be used as the password.
EXISTING SYSTEM:
Phishing web pages are forged web pages
that are created by malicious people to mimic Web pages of real web sites. Most
of these kinds of web pages have high visual similarities to scam their
victims. Some of these kinds of web pages look exactly like the real ones.
Victims of phishing web pages may expose their bank account, password, credit
card number, or other important information to the phishing web page owners. It
includes techniques such as tricking customers through email and spam messages,
man in the middle attacks, installation of key loggers and screen captures.
DISADVANTAGES OF EXISTING SYSTEM:
These popular technologies have several
drawbacks:
1. Blacklist-based technique with low
false alarm probability, but it cannot detect the websites that are not in the
blacklist database. Because the life cycle of phishing websites is too short and
the establishment of blacklist has a long lag time, the accuracy of blacklist
is not too high.
2. Heuristic-based anti-phishing
technique, with a high probability of false and failed alarm, and it is easy
for the attacker to use technical means to avoid the heuristic characteristics detection.
3. Similarity assessment based technique
is time-consuming. It needs too long time to calculate a pair of pages, so
using the method to detect phishing websites on the client terminal is not
suitable. And there is low accuracy rate for this method depends on many factors,
such as the text, images, and similarity measurement technique. However, this technique
(in particular, image similarity identification technique) is not perfect
enough yet.
PROPOSED SYSTEM:
The concept of image processing and an
improved visual cryptography is used. Image processing is a technique of
processing an input image and to get the output as either improved form of the
same image and/or characteristics of the input image. In Visual Cryptography
(VC) an image is decomposed into shares and in order to reveal the original
image appropriate number of shares should be combined.
VCS is a cryptographic technique that
allows for the encryption of visual information such that decryption can be
performed using the human visual system. We can achieve this by one of the following
access structure schemes.
1. (2, 2)- Threshold VCS scheme- This is
a simplest threshold scheme that takes a secret message and encrypts it in two
different shares that reveal the secret image when they are overlaid.
2. (n, n) -Threshold VCS scheme-This
scheme encrypts the secret image to n shares such that when all n of the shares
are combined will the secret image be revealed.
3. (k, n) Threshold VCS scheme- This
scheme encrypts the secret image to n shares such that when any group of at
least k shares are overlaid the secret image will be revealed.
In the case of (2, 2) VCS, each pixel P
in the original image is encrypted into two sub pixels called shares. Figure.1
denotes the shares of a white pixel and a black pixel. Note that the choice of
shares for a white and black pixel is randomly determined (there are two
choices available for each pixel). Neither share provides any clue about the
original pixel since different pixels in the secret image will be encrypted
using independent random choices. When the two shares are superimposed, the
value of the original pixel P can be determined. If P is a black pixel, we get two
black sub pixels; if it is a white pixel, we get one black sub pixel and one
white sub pixel.
ADVANTAGES OF PROPOSED SYSTEM:
For phishing detection and prevention,
we are proposing a new methodology to detect the phishing website. Our
methodology is based on the Anti-Phishing Image Captcha validation scheme using
visual cryptography. It prevents password and other confidential information
from the phishing websites.
MODULES:
Registration phase
Login phase
MODULES
DESCRIPTION:
Registration phase
In the registration phase,
a key string (password) is asked from the user at the time of registration for
the secure website. The key string can be a combination of alphabets and numbers
to provide more secure environment. This string is concatenated with randomly generated
string in the server and an image captcha[19] is generated. The image captcha
is divided into two shares such that one of the shares is kept with the user
and the other share is kept in the server. The user's share and the original
image captcha is sent to the user for later verification during login phase.
The image captcha is also stored in the actual database of any confidential
website as confidential data. After the registration, the user can change the
key string when it is needed. Registration process is depicted in Figure
Login phase
In the Login phase first the user is
prompted for the username (user id).Then the user is asked to enter his share
which is kept with him. This share is sent to the server where the user's share
and share which is stored in the database of the website, for each user, is
stacked together to produce the image captcha. The image captcha is displayed
to the user .Here the end user can check whether the displayed image captcha
matches with the captcha created at the time of registration. The end user is
required to enter the text displayed in the image captcha and this can serve
the purpose of password and using this, the user can log in into the website.
Using the username and image captcha generated by stacking two shares one can
verify whether the website is genuine/secure website or a phishing website and
can also verify whether the user is a human user or not. Figure can be used to
illustrate the login phase.
SYSTEM
REQUIREMENTS:
HARDWARE
REQUIREMENTS:
•
System : Pentium IV 2.4 GHz.
•
Hard
Disk : 40 GB.
•
Floppy
Drive : 1.44 Mb.
•
Monitor : 15 VGA Colour.
•
Mouse : Logitech.
•
Ram : 512 Mb.
SOFTWARE
REQUIREMENTS:
•
Operating system : - Windows XP.
•
Coding Language : ASP.NET, C#.Net.
•
Data Base : SQL Server 2005
REFERENCE:
Divya James and Mintu Philip, “A NOVEL ANTI PHISHING
FRAMEWORK BASED ON VISUAL CRYPTOGRAPHY”, International
Journal of Distributed and Parallel Systems (IJDPS) Vol.3, No.1, January 2012.