Visual Cryptography Scheme to Predict Phishing Sites

Full Text Download |
Abstract
Phishing is an attempt by an individual or a
group to thieve personal confidential information such
as passwords, credit card information etc from
unsuspecting victims for identity theft, financial gain
and other fraudulent activities. In this paper we have
proposed a new approach named as "A Novel
Antiphishing framework based on visual cryptography"
to solve the problem of phishing. Here an image based
authentication using Visual Cryptography (vc) is used.
The use of visual cryptography is explored to preserve
the privacy of image captcha by decomposing the
original image captcha into two shares that are stored in
separate database servers such that the original image
captcha can be revealed only when both are
simultaneously available; the individual sheet images
do not reveal the identity of the original image captcha.
Once the original image captcha is revealed to the user
it can be used as the password.
Keywords:Vc, Passwords, Privacy
I.Introduction
VISUAL cryptography (VC), which was proposed
by Naor and Shamir, allows the encryption of secret
information in image form [1]. Following their work,
much research was done on visual secret sharing
schemes (VSSs) [2]. From the point of view of access
structures, the existing VC schemes (VCSs) can be
divided into two categories: threshold access structure
(also known as k-out-of-n VCSs or (k, n)-VCSs) [3]–
[5] and general access structure (GAS) [6]–[12]. Naor
and Shamir focused on how to generate n shares such
that the secret image is revealed by at least k shares (2
≤ k ≤ n).mobile devices have mobile databases in order
to achieve stable data processing.
Ateniese et al. (hereinafter Ateniese) [6] proposed the
GAS concept and also developed a VC-based solution
for some GASs. Using the GAS enables dealers to
define reasonable combinations of shares as decryption
conditions rather than to specify the number of shares.
For example, if there are four participants (one
president, one vice president, and two managers)
sharing a secret, the president may expect to decrypt the
secret with any single colleague who holds one of the
other shares, whereas the vice president is allowed to
obtain the secret only with two managers. The two
managers are restricted from accessing the secret.
Given these flexibilities, we also can set the number of
shares as the decrypting condition. Clearly, (n, n)- and
(k, n)-VCSs are special cases of the GAS.
The pixel-expansion problem is a major drawback
with most VCSs that use the VC-based approach. The
pixelexpansion problem affects the practicability of a
VC scheme because it increases the storage and/or
transmission costs. Moreover, the pixel-expansion
problem usually introduces the side effect that the
recovered secret images have less contrast. The contrast
of the recovered images decreases in proportion to 1/m,
whereas the shares are expanded by a factor of m times..
As a result, the decrease in contrast limits the
application of these VC schemes. To address the pixel
expansion problem, Adhikari et al. also proposed
construction methods for VCSs for GASs; their
approach aims to reduce the pixel expansion factor for
(k, n)-VCSs [10]. Hsu et al. (hereinafter Hsu) used the
probability concept to construct a VCS for GAS [7], [8].
However, Hsu’s method does not guarantee enough
blackness in some access structures, such that
recovered images cannot be recognized by the naked
eyes. Liu et al. proposed a deterministic construction
method for GASs to balance the drawbacks of display
quality and pixel expansion [9].
The developer should use a particular library that is
provided by the vender of mobile database or modify
existing mobile applications for synchronization
process. Because of these flexible restrictions, the
extensibility, adaptability and flexibility of mobile
business systems are markedly decrease. This problem
must be solved in order to build efficient mobile
business systems because upcoming mobile
environments will have heterogeneous characteristics
in which diverse mobile devices, mobile databases, and RDBMS exist. This paper suggests new SAMD
(Synchronization Algorithms based on Message
Digest) in order to resolve the problems mentioned
above. SAMD resolves synchronization problems using
only standard SQL queries as certified by the ISO
(International Organization for Standardization). This
is followed by a possible synchronization of any data
combination regardless of the kind of server-side
database or mobile database.
The SAMD therefore would provide extensibility,
adaptability and flexibility.
References:
- M. Naor and A. Shamir, “Visual cryptography,” in Advances in Cryptology, vol. 950. New York, NY, USA: Springer-Verlag, 1995, pp. 1–12.
- J. Weir and W. Yan, “A comprehensive study of visual cryptography,” in Transactions on Data Hiding and Multimedia Security V (LNCS), vol. 6010. New York, NY, USA: Springer-Verlag, 2010, pp. 70–105.
- C. N. Yang, “New visual secret sharing schemes using probabilistic method,” Pattern Recognit. Lett., vol. 25, no. 4, pp. 481–494, 2004.
- R. Ito, H. Kuwakado, and H. Tanaka, “Image size invariant visual cryptography,” IEICE Trans. Fundam., vol. E82-A, no. 10, pp. 2172–2177, 1999.
- P. L. Chiu and K. H. Lee, “A simulated annealing algorithm for general threshold visual cryptography schemes,” IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 992–1001, Sep. 2011.
- G. Ateniese, C. Blundo, A. D. Santis, and D. R. Stinson, “Visual cryptography for general access structures,” Inf. Comput., vol. 129, no. 2, pp. 86–106, 1996.
- C. S. Hsu and Y. C. Hou, “Goal-programming-assisted visual cryptography method with unexpanded shadow images for general access structures,” Opt. Eng., vol. 45, no. 9, pp. 097001-1–097001-10, 2006.
- C. S. Hsu, S. F. Tu, and Y. C. Hou, “An optimization model for visual cryptography schemes with unexpanded shares,” in Foundations of Intelligent Systems (LNAI), vol. 4203. New York, NY, USA: Springer- Verlag, 2006, pp. 58– 67.
- F. Liu, C. Wu, and X. Lin, “Step construction of visual cryptography schemes,” IEEE Trans. Inf. Forensics Security, vol. 5, no. 1, pp. 27–38, Mar. 2010.
- A. Adhikari, T. K. Dutta, and B. Roy, “A new black and white visual cryptographic scheme for general access structures,” in Progress in Cryptology (LNCS), vol. 3348. New York, NY, USA: Springer-Verlag, 2004, pp. 399–413.
- L. A. MacPherson, “Grey level visual cryptography for general access structures,” M.S. thesis, School of Comput. Sci., Univ. Waterloo, Waterloo, ON, Canada, 2002.
- K. H. Lee and P. L. Chiu, “An extended visual cryptography algorithm for general access structures,” IEEE Trans. Inf. Forensics Security, vol. 7, no. 1, pp. 219–229, Feb. 2012.
- F. Liu, C. K. Wu, and X. J. Lin, “A new definition of the contrast of visual cryptography scheme,” Inf. Process. Lett., vol. 110, no. 7, pp. 241–246, 2010.
- C. Blundo and A. De Santis, “Visual cryptography schemes with perfect reconstruction of black pixels,” Comput. Graph., vol. 22, no. 4, pp. 449–455, 1998.
- T. Hofmeister, M. Krause, and H. U. Simon, “Contrastoptimal k out of n secret sharing schemes in visual cryptography,” Theoretical Comput. Sci., vol. 240, no. 2, pp. 471–485, 2000.
- H. Koga, “A general formula of the (t, n)-threshold visual secret sharing scheme,” in Advances in Cryptology, Asiacrypt. New York, NY, USA: Springer-Verlag, 2002, pp. 328–345.
- Y. W. Chow, W. Susilo, and D. S.Wong, “Enhancing the perceived visual quality of a size invariant visual cryptography scheme,” in Information and Communications Security (LNCS), vol. 7618. New York, NY, USA: Springer- Verlag, 2012, pp. 10–21.
- H. B. Zhang, X. F. Wang, W. H. Cao, and Y. P. Huang, “Visual cryptography for general access structure using pixelblock aware encoding,” J. Comput., vol. 3, no. 12, pp. 68–75, 2008.