Advertisement

Phishing Site Detection and Blacklisting Using EVCS, Steganography Based on Android Application

  • Ashitha Shaji
  • Mariya Stephen
  • Seethal Sadanandan
  • S. Sreelakshmi
  • K. A. FasilaEmail author
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 26)

Abstract

Online shopping allows consumers to buy goods or services over the Internet. As the popularity of online shopping increases, Debit or Credit card fraud and personal information security are major concerns for customers, merchants, and banks. Identity theft and phishing are the common dangers of online shopping. In phishing process, suppose cheater sends out thousands of phishing emails with a link to the fake website. Victims click on links in email believing it is legitimate. They enter personal information on that fake website. Fraudsters use this information to login to the original website. This paper proposes a new scheme of detecting and preventing phishing sites. It is done using extended visual cryptography, steganography and android application. It reduces user interaction by auto-upload of shares and QR code details during authentication and this adds to security by reducing errors due to manual intervention.

Keywords

Phishing One time password Quick response code Visual cryptography Steganography Auto-upload 

References

  1. 1.
    Roy, S., Venkateswaran, P.: Online payment system using steganography and visual cryptography. In: IEEE Students Conference on Electrical, Electronics and CS (2014)Google Scholar
  2. 2.
    Shemin P.A., Vipinkumar K.S.: E payment system using visual and quantum cryptography. In: Elsevier International Conference on Emerging Trends in Engineering, Science and Technology (2015)Google Scholar
  3. 3.
    Kahairnar, S.: Anti-phishing framework based on extended visual cryptography and qr code. In: IEEE Published in INFOCOM, Proceedings (2010)Google Scholar
  4. 4.
    Prakash, P, Kumar, M., Kompella, R.R., Gupta, M.: PhishNet: predictive blacklisting to detect phishing attacks. In: International Joint Conference on Artificial Intelligence (2009)Google Scholar
  5. 5.
    Liu, F., Wu, C.: Embedded extended visual cryptography schemes. IEEE Trans. Inf. Forensics Secur. (ICCC) 6, 307–322 (2011)CrossRefGoogle Scholar
  6. 6.
    Thangadurai, K., Sudha, G.: An analysis of LSB based image steganography techniques. In: IEEE International Conference on Computer Communication (2014)Google Scholar
  7. 7.
    Khairnar, S., Kharat, R.: Online fraud transaction prevention system using extended visual cryptography and QR code. In: International Conference on Computing Communication Control and automation (ICCUBEA) (2016)Google Scholar
  8. 8.
    Islam, S., Modi, M.R., Gupta, P.: Edge-based image steganography. EURASIP J. Inf. Secur. 2014, 8 (2014).  https://doi.org/10.1186/1687-417X-2014-8CrossRefGoogle Scholar
  9. 9.
    Mishra, S.K., Biswaranjan, K.: Extended visual cryptography for general access structures using random grids. In: International Conference on Advances in Computing, Communications and Informatics (ICACCI) (2015)Google Scholar
  10. 10.
    Praveen Kumar, P., Sabitha, S.: User authentication using visual cryptography. In: International Conference on Control, Communication and Computing India (ICCC) (2015)Google Scholar
  11. 11.
    Moholkar, D., Kadam, N., Deokar, D., Kute, A., Kadam, S.: An efficient approach for phishing website detection using visual cryptography (VC) and quick response code (QR Code). Int. J. Comput. Appl. 115(12), 13–16 (2015)Google Scholar
  12. 12.
    Roy, S., Venkateswaran, P.: A text based steganography technique with Indian root. In: International Conference on Computational Intelligence: Modeling Techniques and Applications (CIMTA) (2013)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Ashitha Shaji
    • 1
  • Mariya Stephen
    • 1
  • Seethal Sadanandan
    • 1
  • S. Sreelakshmi
    • 1
  • K. A. Fasila
    • 1
    Email author
  1. 1.Department of Computer Science and EngineeringMuthoot Institute of Science and TechnologyErnakulamIndia

Personalised recommendations