Internati
o
nal
Journal of Ele
c
trical
and Computer
Engineering
(IJE
CE)
Vol.
5, No. 6, Decem
ber
2015, pp. 1511~
1
515
I
S
SN
: 208
8-8
7
0
8
1
511
Jo
urn
a
l
h
o
me
pa
ge
: h
ttp
://iaesjo
u
r
na
l.com/
o
n
lin
e/ind
e
x.ph
p
/
IJECE
Anti-Phishing Techniques in Cryptography
Akshe
y
Nand
a, Himanshu
Gupta
Amity
Institute
of Informa
tion
Technolog
y
,
Amity
Un
iver
sity
Campus, Sector-12
5
, No
ida (Uttar
Pradesh), Ind
i
a
Article Info
A
B
STRAC
T
Article histo
r
y:
Received
J
u
n 30, 2015
Rev
i
sed
Au
g
26
, 20
15
Accepted
Sep 15, 2015
Phishing is a pro
cess in which Ph
ishers tr
y
to
leak
out
the cred
entials of users
b
y
hosting a fak
e
web p
a
ge on
user'
s
br
owser.
To save users fr
om phishing
attacks, man
y
research
ers hav
e
dug deep an
d presented their insights.
Nowada
y
s
,
in t
h
e era of 21
st
centur
y
,
b
a
nks ar
e using the OTP and visual
cr
y
p
tograph
y
fo
r the authent
i
c
a
t
i
on of
both sides i.e. user and the bank. In
this pap
e
r, w
e
ar
e proposing
a methodolog
y
in
w
h
ich a
user
will need to
giv
e
his finger
prin
ts
as an
auth
entication.
Keyword:
Fi
nge
r pri
n
t
OTP
Ph
ish
i
ng
V
i
su
al C
r
yp
togr
aph
y
Copyright ©
201
5 Institut
e
o
f
Ad
vanced
Engin
eer
ing and S
c
i
e
nce.
All rights re
se
rve
d
.
Co
rresp
ond
i
ng
Autho
r
:
Aks
h
ey
Na
nda
,
Am
i
t
y In
stitu
te of Inform
at
io
n Techno
log
y
,
Am
i
t
y Un
iv
ersity Ca
m
p
u
s
,
Sector-125,
Noida (Uttar Pra
d
esh),
India.
Em
a
il:
1.
INT
R
O
D
UCTI
O
N
No
wa
day
s
onl
i
n
e t
r
ansact
i
o
n
s
have
becom
e
very
com
m
o
n
. M
o
st
o
f
t
h
e
users u
s
e t
h
e
m
e
di
u
m
of
onl
i
n
e
t
r
a
n
sact
i
on
rat
h
e
r
t
h
an
cash
as i
t
'
s act
ual
l
y
easy
f
o
r
not
kee
p
i
n
g ca
sh
ha
ndy
.
Al
s
o
, o
n
e
d
o
es
n'
t
have t
o
g
o
to
th
e b
a
nk
. Ind
e
ed
,
on
lin
e tran
saction
s
hav
e
m
a
d
e
life easier and
stress-free. B
u
t th
e con
t
rad
i
ction
i
s
, th
is
technology
has
given a clea
n
chance
to Phis
hers
to leak
y
o
ur cre
d
e
n
tials.
The
way t
h
ey leak t
h
e c
r
ede
n
t
i
als of
a user i
s
k
n
o
w
n
as p
h
i
s
hi
ng t
echni
que
. I
n
t
h
i
s
, t
h
e P
h
i
s
he
r h
o
st
s hi
s o
w
n we
b pa
ge a
n
d t
h
at
i
s
whe
r
e y
o
u
ent
e
r y
o
u
r
us
er nam
e
and
pass
wo
rd
an
d
sen
d
i
t
t
o
t
h
e Phi
s
her
[2]
,
[1
0]
. Acc
o
rd
i
ng t
o
y
o
u
r
v
i
ew o
f
knowledge, you ha
ve sent your re
quest
to the server but actually it is
se
nt to the Phisher because the hoste
d
page
bel
o
n
g
e
d
t
o
P
h
i
s
he
r a
n
d
not
t
o
se
rve
r
.
S
o
t
h
i
s
i
s
how, a Ph
ish
e
r leak
s
yo
ur cred
en
tials and
m
i
su
ses th
em
.
A l
a
rge
no
. o
f
researc
h
er
s ha
ve gi
ve
n t
h
ei
r i
d
eas t
o
re
duce phis
h
ing like visual cryp
togra
phy and the
OTP etc.
b
u
t
th
ese techn
i
qu
es h
a
v
e
no
t b
een
ab
le to
co
m
p
letely
d
e
m
o
lish
th
e
p
h
i
sh
ing
techniq
u
e
.
A
lth
ough
, th
e
num
ber ha
s re
duce
d
but
n
o
t
vani
s
h
e
d
y
e
t
.
[3]
-
[
7
]
.
I
n
t
h
i
s
r
e
search
, we
ha
ve p
r
o
p
o
se
d a way
i
n
w
h
i
c
h
one ca
n
com
b
i
n
e bi
om
et
ri
c of
fi
nge
r
pri
n
t
s
an
d
OT
P
f
o
r a
u
t
h
e
n
t
i
cat
i
on
o
f
user
an
d
ser
v
er
.
1.
1. Vi
su
al
C
r
ypt
o
gr
aph
y
Visual crypt
o
graphy is a tec
hni
que
used for user
and se
rve
r
authe
n
tication. This technique wa
s
pr
o
pose
d
by
N
a
or a
n
d S
h
am
ir [
1
]
.
I
n
t
h
i
s
t
echni
que
, t
h
ey
pr
o
p
o
s
ed t
h
e
fact
t
h
at
i
f
t
h
e
sy
st
em
gener
a
t
e
s a
random
image and di
vides t
h
at im
age in two
or m
o
re s
h
ares if we
conca
t
enate these two s
h
ares
. T
h
e i
m
age
created
b
y
concaten
atin
g th
ese two
im
ag
es will b
e
t
h
en
match
e
d
with
o
r
i
g
in
al im
ag
e [5
], [8
].
An
d if the
im
ages are
m
a
tched, the
n
both sides im
ply authenticatio
n else there is
som
e
Phisher in betwee
n.
We can
divide
the im
age in m
a
ny sha
r
es as
shown below:
1) (
2
,
2)
, Th
re
shol
d VC
S sc
h
e
m
e
:
Thi
s
i
s
t
h
e sim
p
l
e
st
t
h
reshol
d sch
e
m
e
that
t
a
kes a sec
r
et
m
e
ssage
an
d en
cryp
ts it
in
two
d
i
fferent sh
ar
e
s
whic
h
fu
rthe
r re
veal t
h
e sec
r
et
im
age when they a
r
e concatenate
d
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
S
SN
:
2
088
-87
08
IJECE
Vol. 5, No. 6, D
ecem
ber
2015 :
1511 –
1515
1
512
2)
(n
, n
)
, T
h
re
shol
d VC
S sch
e
m
e
:
Thi
s
sche
m
e
encry
p
ts the secret im
age to n s
h
ares i
n
suc
h
a way
th
at wh
en all n of th
e sh
ares are co
n
cat
en
ated
, t
h
e secret imag
e
will b
e
revealed
.
3)
(k
, n
)
, T
h
re
shol
d VC
S sch
e
m
e
:
Thi
s
sche
m
e
encry
p
ts the secret im
age to n s
h
ares i
n
suc
h
a way
th
at wh
en an
y
g
r
ou
p of at least k
sh
ares is
ov
erlaid, th
e secret im
ag
e will b
e
rev
ealed
.
Fig
u
r
e
1
.
V
i
sual Cr
yp
tog
r
aphy
In t
h
e case
of (2,
2) VCS, eac
h
pixel P in the ori
g
in
al im
ag
e is en
cryp
ted
in
to
two
sub
p
i
x
e
ls called
share
s
. In
Fi
g
u
r
e.
1, Sha
r
e 1 d
e
not
es
t
h
e
s
h
a
r
es
o
f
whi
t
e
pi
x
e
l
and
S
h
are
2
of
bl
ac
k pi
xel
.
Note that the
choice
of s
h
ares for a white and
bl
ack
pi
xe
l
i
s
rand
om
ly
det
e
rm
i
n
ed (t
h
e
re are t
w
o
choices a
v
ailable for each
pi
xel).
None of
the sha
r
es pr
ovide a
n
y clue about the or
igi
n
al pixel as di
ffe
rent
pixels i
n
the
se
cret im
age are
encr
y
p
t
e
d usi
n
g
i
n
de
pen
d
e
n
t
ran
d
o
m
choi
ces.
In Fi
gure 2,
whe
n
the two shares are s
u
perim
posed, the value
of t
h
e original pi
xel P can be
det
e
rm
i
n
ed. I
f
P i
s
a bl
ack
pi
xel
,
we
get
t
w
o
bl
ack s
ub
pi
xe
l
s
;
i
f
i
t
i
s
a whi
t
e
pi
xel
,
we
get
one
bl
ack s
u
b
pi
xel
an
d on
e
wh
ite su
b p
i
x
e
l.
Fi
gu
re 2.
S
h
o
w
i
ng pi
xel
s
i
n
vi
sual
cry
p
t
o
gra
phy
1.2. Bi
ometric
Security: Finger Print Pr
oc
essing
As sci
e
nt
i
s
t
s
h
a
ve p
r
o
v
e
d
t
h
a
t
som
e
feat
ure
s
or at
t
r
i
b
ut
es
of a pe
rs
on
de
fi
ne hi
s
uni
que
ness. T
h
ese
featu
r
es are one in
a b
illio
n
.
Si
m
ilarly,
in
b
i
o
m
e
t
ric f
eatu
r
e, we can
tak
e
th
e Retin
a, iris an
d
fi
n
g
e
r prin
ts
whi
c
h ap
par
e
n
t
l
y
are uni
q
u
e
fo
r eve
r
y
i
n
d
i
vi
dual
.
Thi
s
i
s
why
no
wa
d
a
y
s
com
p
ani
e
s have st
a
r
t
e
d
usi
n
g
bi
om
et
ri
c for
a
t
t
e
ndanc
e [
9
]
.
And as a re
sul
t
, this has
brought tra
n
spa
r
e
n
cy in
the syst
e
m
because a
pers
on can m
a
rk
only his
at
t
e
ndan
ce.
N
o
ot
her
pe
rs
on
can m
a
rk t
h
e
at
t
e
nda
nce
of
som
e
ot
her i
ndi
vi
d
u
al
beca
use
by
nat
u
re'
s
l
a
w
,
no
b
ody
ca
n
st
eal
t
h
e fi
nge
r
pr
i
n
t
s
o
f
a
n
y
pe
rs
on
.
I
n
Figu
r
e
4, it is show
n th
at
ho
w ou
r system
w
o
r
k
s to ch
eck th
e
f
i
ng
erp
r
i
n
ts of
a
p
e
r
s
on
.
Fi
gu
re 3.
Fi
n
g
e
r
pri
n
t
Evaluation Warning : The document was created with Spire.PDF for Python.
I
J
ECE
I
S
SN
:
208
8-8
7
0
8
Ant
i
-
P
h
i
s
hi
ng
Tech
ni
q
u
es
i
n
C
r
ypt
o
gr
ap
hy (
A
kshey
N
a
n
d
a
)
1
513
Fi
gu
re
4.
Fi
n
g
e
r
P
r
i
n
t
P
r
ocessi
ng
1.
3. B
a
ck
gr
ou
nd
As
per t
h
e c
u
r
r
ent
m
e
t
hod
ol
ogy
,
f
o
r
p
u
rs
ui
ng
an
o
n
l
i
n
e t
r
ansact
i
o
n, a
us
er vi
si
t
s
t
h
e
w
e
bsi
t
e
o
f
t
h
e
ban
k
a
nd t
h
en
subm
i
t
s
hi
s u
s
ernam
e
and
p
a
ssw
or
d t
o
t
h
e
serve
r
.
Ser
v
e
r
aut
h
ent
i
cat
es
t
h
e use
r
nam
e
and
p
a
ssword.
If they are au
th
en
ticated
th
en
t
h
e
u
s
er w
ill b
e
log
g
e
d
i
n
an
d will h
a
v
e
t
h
e access of
h
i
s acco
u
n
t
.
Al
so, i
f
a use
r
want
s t
o
pe
rf
o
r
m
any
t
r
ansact
ion
,
he has
to
co
m
p
lete
th
e p
r
o
cess of OTP. In
th
is m
e
th
o
d
o
l
og
y,
if Ph
ish
e
rs
h
o
st th
eir
o
w
n
web
p
a
g
e
, th
en
t
h
ey will b
e
ab
le
to
leak
t
h
e
u
s
ern
a
m
e
s an
d
p
a
ssword
s easily [4
].
2.
RESE
A
R
C
H
METHO
D
W
e
ar
e
p
r
o
posin
g a
w
a
y to in
cr
ease th
e
secu
rity fo
r on
lin
e tran
sacti
o
n
s
to red
u
c
e th
e
p
h
i
sh
ing
attack
s. In
th
is p
r
op
o
s
ed
way, a
u
s
er will
p
r
ov
id
e
t
h
e b
a
n
k
with
h
i
s
fi
ng
er
prin
ts. When
ev
er
th
e u
s
er wan
t
s
to
d
o
an
y transactio
n
,
h
e
will v
i
sit to
th
e b
a
nk
's URL an
d
en
ter h
i
s
u
s
ern
a
me an
d
p
a
sswo
rd
. If
u
s
ern
a
m
e
and
p
a
ssword
are au
th
en
ticated
by th
e b
a
nk
, th
en
th
e b
a
nk
will fu
rther ask
for th
e OTP sen
t
o
n
h
i
s p
hon
e.
After
th
e OTP au
th
en
ticatio
n
,
th
e
u
s
er will
b
e
log
g
e
d
i
n
h
i
s acco
un
t.
No
t
o
n
l
y th
is,
b
u
t
also if th
e user wan
t
s
t
o
perform
any changes in
his
account
for illustration, cha
n
ge
of
pa
ssword, he
'll
again have
t
o
give his
finge
r
p
r
i
n
ts fo
r t
h
e au
th
en
ticatio
n
.
Th
ese
fing
er
prin
ts will b
e
d
i
v
i
d
e
d
in
t
w
o
parts with
d
i
fferen
t v
a
l
u
es.
One sh
are
will b
e
d
i
scarded
an
d
t
h
e
o
t
h
e
r sh
are
will b
e
sen
t
to
t
h
e
b
a
nk
. Th
e
b
a
n
k
wi
ll also
d
i
v
i
d
e
t
h
e fi
n
g
e
r
p
r
i
n
ts with
sam
e
val
u
e an
d
di
scar
d t
h
e
di
ffe
re
nt
im
ag
e that wa
s rec
e
ived
from
the
u
s
er
's
e
n
d.
T
h
en
,
th
e
b
a
nk
w
ill
concate
n
ate these two im
ag
es and m
a
tc
h
th
em
with
th
e fing
er
prin
ts g
i
v
e
n
b
y
th
e u
s
er at th
e ti
me o
f
reg
i
stration
.
After th
ese two
i
m
ag
es are m
a
t
c
h
e
d, th
e u
s
er
will b
e
au
th
en
ticated
an
d
h
e
nce, tran
saction
will b
e
p
r
o
ceed
e
d. But b
e
fore th
e fi
n
g
e
r prin
t process, th
e
u
s
er will also
h
a
ve to
g
o
fo
r t
h
e OTP pro
c
ess fo
r
au
th
en
ticatio
n
.
Th
ere will be t
w
o ph
ases in
t
h
e
o
n
lin
e tran
sactio
n
:
1)
Lo
gi
n
2
)
On
lin
e
Paymen
t
L
ogi
n
In
th
e l
o
g
i
n
phase, th
e u
s
er will first en
ter th
e u
s
ern
a
m
e
an
d
p
a
sswo
rd
and
th
en
will su
bmit
it to
th
e
Ban
k
'
s serv
er.
Th
en
th
e b
a
nk
's serv
er will sen
d
t
h
e OT
P on th
e u
s
er's p
hon
e th
rou
g
h
m
e
ssag
e
. Th
e
u
s
er will
enter the OTP receive
d on hi
s phone
. The
bank
will auth
orise it. And aft
e
r the OTP's authorisation done by
the ba
nk, t
h
e
user
will get
the
access to his a
ccount.
Online Pa
y
m
ent
After the logi
n phase
, the use
r
will get the access to
his ac
count. Now the us
er ca
n only check his
bal
a
nce
an
d i
f
he
want
s
t
o
pe
r
f
o
r
m
any
t
r
ans
act
i
on
or
d
o
a
n
y
chan
ges
i
n
hi
s acco
u
n
t
,
he'
l
l ha
ve t
o
pr
ovi
d
e
hi
s
fing
er
p
r
i
n
t auth
en
ticatio
n. Ev
en if th
e
u
s
er wan
t
s to
ch
ang
e
th
e
p
a
ssword, h
e
h
a
s to
t
a
k
e
th
e
fing
er
p
r
i
n
t
authe
n
tication. Ultim
a
t
ely, these two
phases will bring m
o
re sec
u
rity th
a
n
t
h
e c
u
rrent
methodology
because
even if the Phi
s
her
gets the usernam
e
and password, th
e
n
also he will not be able
to take the access
of the
account
beca
us
e of the
OT
P.
Th
e co
m
p
lete p
r
o
cess of
b
i
ometric au
th
en
ti
catio
n
is sho
w
n
b
e
low in Figu
re 5.
Fig
u
re
5
.
Bio
m
etric Au
th
en
ticatio
n
Evaluation Warning : The document was created with Spire.PDF for Python.
I
S
SN
:
2
088
-87
08
IJECE
Vol. 5, No. 6, D
ecem
ber
2015 :
1511 –
1515
1
514
2.2. Matc
hing Patterns
in
Fi
ngerprint
Wh
en
u
s
er will
g
i
v
e
h
i
s fing
er p
r
in
ts
fo
r
th
e
au
t
horizatio
n
p
u
rp
o
s
e, h
i
s
fi
n
g
e
r p
r
i
n
ts will
b
e
d
i
v
i
d
e
d
in
to
two
sh
ares. On
e will h
a
v
e
so
m
e
p
i
x
e
ls an
d
o
t
h
e
r will h
a
v
e
so
m
e
p
i
x
e
ls.
On
e
o
f
th
e sh
ares wi
ll b
e
tran
sm
it
ted
to
th
e b
a
nk
fo
r th
e au
tho
r
ization
.
Th
e b
a
nk
will also
d
i
v
i
d
e
th
e i
m
ag
e o
f
finger prin
ts of th
e sa
m
e
u
s
er
with
t
h
e sa
m
e
alg
o
r
ith
m
.
Also, th
e
b
a
nk will h
a
v
e
t
h
e sa
m
e
two
sh
ares o
f
t
h
e fi
n
g
e
r
p
r
i
n
ts. Th
e b
a
nk
will
concate
n
ate these two sha
r
es
(one
receive
d from
the user
'
s
end and the other which is done
by the bank). If
the im
age generated from
concatenatio
n
of th
ese two
sh
ares m
a
tch
th
e o
r
i
g
in
al fing
er p
r
in
ts, th
en
the u
s
er
will b
e
au
th
en
t
i
cated
, as sho
w
n
in Figure
6
.
Fig
u
r
e
6
.
Sh
ar
es of
f
i
ng
er
pr
int
Now t
h
e
q
u
estio
n
arises, b
y
wh
ich
v
a
lu
e the i
m
ag
e will be d
i
v
i
d
e
d
in
t
o
sh
ares.
We
h
a
v
e
to
u
s
e t
h
e
v
a
lu
e wh
ich will b
e
kno
wn
t
o
th
e
b
a
n
k
and
t
h
e
u
s
er
o
n
l
y.
No
t an
y t
h
ird
person
shou
ld
be aware
o
f
th
is v
a
lue.
Fo
r t
h
is, we
will u
s
e th
e OTP v
a
lu
e t
h
at was en
tered
b
y
th
e u
s
er in
log
i
n
ph
ase.
Th
e
ban
k
h
a
d
sen
t
t
h
e OTP
o
n
th
e
u
s
er's ph
on
e in
th
e login
p
h
a
se. Th
e
ap
p
lication
which
will d
i
v
i
d
e
th
e fin
g
e
r prints in
two
sh
ares wil
l
rem
e
m
b
er t
h
e OTP e
n
t
e
re
d
b
y
t
h
e use
r
.
If
t
h
e
user
wa
nt
s t
o
do a
n
y
t
r
a
n
s
act
i
on
or a
n
y
c
h
an
ge i
n
t
h
e
ac
cou
n
t
,
h
e
will g
i
v
e
h
i
s fin
g
e
r p
r
i
n
ts for au
th
en
ticatio
n. Th
e app
li
catio
n
th
at will
d
i
v
i
d
e
th
e fi
n
g
er p
r
i
n
ts in
two sh
ares
will g
e
n
e
rate th
e
v
a
lu
e
fro
m
th
e OTP an
d
t
h
e algo
rith
m
w
ill u
s
e th
ese
v
a
lu
es fo
r d
i
v
i
d
i
n
g
th
e
fing
er
prin
ts in
two
sh
ares.
The b
a
n
k
will also
k
now
th
e OTP sen
t
and
will u
s
e th
e sam
e
v
a
lu
e fo
r fi
ng
er prin
t sh
ares. Th
e
OTP
will n
o
t
be k
n
o
w
n
to
th
e p
h
i
sh
er. So
h
e
will n
o
t
b
e
ab
le to
u
s
e fing
er p
r
in
ts ev
en
if
h
e
g
e
ts th
e co
py of
th
at.
3.
CO
NCL
U
S
ION
In t
h
e c
u
r
r
ent
m
e
t
hod
ol
o
g
y
,
t
h
e
user e
n
t
e
rs
t
h
e
user
nam
e
and
t
h
e
pass
wo
r
d
a
nd
get
s
t
h
e
l
ogi
n
i
n
hi
s
account. And if the use
r
has to pe
rform
any
transaction,
he has to go for
OTP,
so in this c
a
se if the Phis
her is
h
o
s
ti
n
g
h
i
s o
w
n
web
s
ite, th
en th
e u
s
er's u
s
ern
a
m
e
an
d
p
a
ssword
will b
e
su
b
s
equ
e
n
tly le
ak
ed
.
And
thus, the
Phisher
will easily get the access of
his acc
ount. In
ou
r methodol
ogy, t
h
e user
will enter the use
r
name and
p
a
ssword, t
h
en h
e
will g
e
t t
h
e OTP
o
n
h
i
s
p
hon
e to en
ter
on
t
h
e
web
s
it
e. After th
is, if u
s
er
wan
t
s to
d
o
an
y
t
r
ansact
i
o
n or
any
cha
n
ges, he
f
u
rt
he
r has t
o
gi
ve hi
s
fi
n
g
er p
r
i
n
t
s
fo
r aut
h
e
n
t
i
cat
i
on.
A
n
d
t
h
e way
fi
n
g
er
pri
n
t
s
are
di
vi
d
e
d i
n
t
o
t
w
o
sha
r
es i
s
hi
g
h
l
y
se
cure
.
4.
F
U
T
U
RE
WOR
K
S
Pre
v
i
o
usl
y
, t
h
e user
fi
rst
ha
d t
o
a
u
t
h
ori
s
e
t
h
r
o
u
g
h
hi
s
u
s
ernam
e
and
p
a
ssw
or
d. T
h
e
n
i
f
t
h
e
user
want
e
d
t
o
do
a
n
y
t
r
a
n
sact
i
o
n,
he
ha
d t
o
go
t
h
r
o
ug
h t
h
e
OT
P p
r
ocess.
I
n
o
u
r
m
e
t
hodol
og
y
,
we
ha
ve
pr
o
pos
ed
a way in whic
h the use
r
will be first aut
h
e
n
ticated by
his user
nam
e
an
d password
and then
will receive a
n
OTP.
Gra
d
ually, the user
will then
ha
ve to go through the
OTP proce
ss
because only t
h
en, he will get the
access of
his a
ccount. For a
ny tr
ansaction, the use
r
has to
do t
h
e finge
r
pr
ints proce
ss. In fu
ture work,
we will
go f
o
r t
h
e prac
t
i
cal
im
pl
em
en
t
a
t
i
on of t
h
i
s
m
e
t
hod
ol
o
g
y
and al
so f
o
r so
m
e
new resear
ch pa
per o
n
t
h
e sam
e
t
opi
c
of m
a
ki
n
g
onl
i
n
e
t
r
a
n
sa
ct
i
ons m
o
re se
cure
d. B
eca
use
fo
r
p
h
i
s
hi
n
g
a
t
t
acks, t
h
e
p
h
i
s
hers
ha
ve t
o
g
e
t
al
l
t
h
e necessa
ry
el
em
ent
s
such a
s
user
nam
e
and pass
w
o
r
d
,
O
T
P, fi
nge
r p
r
i
n
t
s
, val
u
e
used
f
o
r
di
vi
di
ng t
h
e
fi
nge
r
p
r
i
n
ts etc. and in
d
e
ed
, it wi
ll b
e
d
i
fficu
lt
to
attain
th
ese th
ing
s
. So
, usin
g
t
h
is m
e
th
o
d
o
l
og
y th
e
on
lin
e
tran
saction
will b
eco
m
e
m
o
re secured.
REFERE
NC
ES
[1]
M. Naor
and A.
Shamir, "Visual
Cr
y
p
togr
aph
y
,"
in the proceeding
of
EUROCRYPT
, pp. 1-12, 199
4.
[2]
Div
y
a Jam
e
s Mi
ntu Philip "A Novel Anti Phishin
g
fram
e
work based on Visual Cr
yptogr
aph
y
",
in IEEE
transactio
n
,
2012,
Evaluation Warning : The document was created with Spire.PDF for Python.
I
J
ECE
I
S
SN
:
208
8-8
7
0
8
Ant
i
-
P
h
i
s
hi
ng
Tech
ni
q
u
es
i
n
C
r
ypt
o
gr
ap
hy (
A
kshey
N
a
n
d
a
)
1
515
[3]
Ahmad Alamgir
Khan, "Preventing Phis
hing Attacks using One Time Password
and Us
er M
achi
n
e Identif
ic
ation
"
,
in International
Journal
of Computer App
lica
tion
s
, Vol. 68, No. 3
,
pp
7-11, 2013.
[4]
Ga
ura
v
,
Ma
dhure
sh Mishra
,
A
nura
g
Ja
in,
"Anti-Phishing Techniques: A Rev
i
ew",
in
Interna
tional Journal of
Engine
ering R
e
search andApp
lic
ations (
I
JERA)
,
pp. 350-355
, 20
12.
[5]
Mrs. A. Vinodhini, M. Preman
and, M. Natar
a
jan, "Visual Cr
y
p
tograph
y
Using
Two Factor Bio
m
etric S
y
stem for
Trust worth
y
Authenti
ca
tion",
in
International Jo
urnal of Scie
ntific and Research Publica
tions,
Vol. 2, No. 3, pp 1-
5, 2012
.
[6]
J
y
oti Chhik
a
ra,
Ritu Dahiy
a
, Neha Garg, and Monika Ra
ni, "Phishing & Anti-Ph
ishing Techniqu
es: Case Stud
y
"
,
in
International Jo
urnal of
Advan
c
ed Research
in
Computer Scien
ce and
Softwar
e
Engineering,
Vol. 3
,
No
. 5, pp. 4
58-
465, 2013
.
[7]
Bhushan Yenurkar1, Shrikan
t
Zade, "An Anti-phishing Fr
amework with New Validation Sch
e
me using Visu
al
Cr
y
p
togr
aph
y
",
In Internationa
l
Journal of Com
put
er Science a
nd Mobile Computing,
Vol. 3
,
No. 2, pp
. 739-7
44,
2014.
[8]
Gaurav Paland
e, ShekharJadh
a
v
,
As
hutosh Malwade, Vishal Divekar
,
a
nd Pro
f
. S. Baj. “An Enhanced Anti-
Phishing Framework Based on Visual Cr
y
p
togr
aph
y
"
,
International Journal of
Emer
ging Resea
r
ch in Management
&
Technology,
Vol. 3
,
No. 3, pp
43-46, 2014.
[9]
V. Krishna Chaitan
y
a Redd
y
,
B
.
Sukum
ar, S. Javeed
Hussain,
"ARM 9
Based Intellig
ent S
y
st
em
for Biom
etric
F
i
gure Authen
ti
cat
ion",
TELKOMNIKA Indones
i
an Journal
of Electrical
Engin
e
ering
, Vol. 13
,
No. 2, pp. 209
-2
14,
2015.
[10]
Yunsang Oh, Takashi Obi, "Iden
tif
y
i
ng Phishi
ng
Threats in
Government Web S
e
rvices",
International Journal
o
f
Infor
m
ation
&
Networ
k S
ecur
i
t
y
(
I
JINS)
, Vol. 2,
No. 1, pp. 32-42, 2013.
BIOGRAP
HI
ES OF
AUTH
ORS
Akshey
Nanda
is
a P
o
s
t
-Gradu
ate s
t
ud
ent of
Am
it
y
Institute of
Information Techno
log
y
,
Amity
University
, Noid
a, Uttar Pradesh, India.
He is pursuing
M.Sc. in Networ
k Technolo
g
y
a
n
d
Ma
n
a
ge
me
nt
a
n
d al
so
h
a
ve
a ce
r
t
ification
of
CCNA Routing
and Switch
i
ng.
Dr. Him
a
ns
hu Gupta is
as
s
o
ciat
e
d
with academ
ic
s
and res
earch a
c
tivi
ties
s
i
nc
e la
s
t
ten
y
e
ars
.
He is working as a Senior Facult
y
Mem
b
er in
Am
it
y
Institu
te of
Inform
ation Technolog
y
,
Amity
University
, Noida.
Dr. Himanshu Gupta is having
specialization
in
Network Security
& Cr
y
p
togr
aph
y
. He is
having pr
estigio
us membership
in var
i
ous re
p
u
ted Int
e
rna
tion
a
l T
echn
i
ca
l
an
d Res
ear
ch
Organiza
tions as IEEE Com
puter S
o
ciet
y
(US
A
), TIF
R
(India), CS
I (India), CS
TA (US
A
),
IACSIT (Singapore), CRSI (Ind
i
a), UACEE (A
ustralia) and W
o
rld Association
of Young
Scientists (Paris
). He has successfull
y
com
p
l
e
ted
a patent t
itl
ed a
s
"A Technique
& Device
for Multiph
a
se
Encr
ypt
i
on" und
er th
e dom
ain
a
r
ea of
Network
Securit
y
& Cr
yp
tograph
y
in
the f
i
eld
of In
for
m
ation Technolo
g
y
and man
y
mo
re patents
have b
een
f
iled
in
same domain.
Dr. Himanshu
Gupta has atten
d
ed man
y
Natio
na
l and Intern
ational Confer
ences, Seminars
and Workshops
and presented man
y
research p
a
pe
rs in the field
of Information
Techno
log
y
.
He has visited to Malay
s
ia, Si
n
g
apore, Thailan
d
, Cambodia,
Vietnam and
Indo
nesia for h
i
s
acad
em
ic and res
earch work.
He has
delivere
d
m
a
ny
t
echni
c
a
l s
e
s
s
i
ons
on
―
Network
S
ecurit
y
& Cr
yptogr
aph
y
ǁ
in
the field of I
n
formation Technolog
y
in var
i
ous reputed
International C
onferences, Wo
rld Summit an
d
other
foreign
universities
as an Inv
ited
Speaker. He has
man
y
R
e
search
Papers and Arti
cles in th
e field o
f
Information Technolog
y
,
which hav
e
b
een
published
in
var
i
ous reput
ed Co
nference Proceedings and Journ
a
ls.
Evaluation Warning : The document was created with Spire.PDF for Python.