AN ANTI-EMULATION STRUCTURE FOR INTERNET DESPOSITORY USING SECURED IMAGE VALIDATION SCHEME

Emulation attack is an effort by an individual or a group to steal personal confidential information such as passwords, credit card information etc, New approach called visual secret sharing scheme (VSS) for cloning websites classification to solve the problem of Phishing attack. The novel system is developed with the things that eradicate the drawbacks of the existing system. The main aim of visual secret sharing scheme is to conserves the solitude of image by decay the original image into two shares that as been stocked in independent database servers such that the authentic image can be revealed only when they are equally gathered. The specific sheet of representation does not declare the status of the original visual image which was generated previously. Once the unique visual image is discovered to the user then that picture can be used as a password for detecting phishing. In the proposed system, privacy enabled secure database is built. The security level is much enhanced from its actual level. The authentication process can be secured by using double level security.

[1]  J. M. Gnanasekar,et al.  CONGESTION CONTROL USING AODV PROTOCOL SCHEME FOR WIRELESS AD-HOC NETWORK , 2016 .

[2]  J. M. Gnanasekar,et al.  Path observation-based physical routing protocol for wireless ad hoc networks , 2016 .

[3]  Akhilendra Pratap Singh,et al.  Detection and Prevention of Phishing Attack Using Dynamic Watermarking , 2011 .

[4]  Iman Heidarpour Shahrezaei,et al.  A TOTAL QUALITY ASSESSMENT SOLUTION FOR SYNTHETIC APERTURE RADAR NLFM WAVEFORM GENERATION AND EVALUATION IN A COMPLEX RANDOM MEDIA , 2017 .

[5]  B. B. Gupta,et al.  A Survey of Phishing Email Filtering Techniques , 2013, IEEE Communications Surveys & Tutorials.

[6]  Patrizio Primiceri,et al.  A SOLAR-POWERED WHITE LED-BASED UV-VIS SPECTROPHOTOMETRIC SYSTEM MANAGED BY PC FOR AIR POLLUTION DETECTION IN FARAWAY AND UNFRIENDLY LOCATIONS , 2017 .

[8]  Sallehuddin Ibrahim,et al.  TECHNIQUES IN ADVANCING THE CAPABILITIES OF VARIOUS NITRATE DETECTION METHODS: A REVIEW , 2017 .

[9]  Franco Frattolillo,et al.  Watermarking Protocol for Web Context , 2007, IEEE Transactions on Information Forensics and Security.

[10]  Yen-Hong A. Chen,et al.  ASSESSMENT TO EFFECTIVENESS OF THE NEW EARLY STREAMER EMISSION LIGHTNING PROTECTION SYSTEM , 2017 .

[11]  M. Rajesh,et al.  Constructing Well-Organized Wireless Sensor Networks with Low-level Identification , 2016 .

[12]  Jianbo Li,et al.  SOCIAL POPULARITY BASED ROUTING IN DELAY TOLERANT NETWORKS , 2016 .

[13]  Shian-Shyong Tseng,et al.  Automatic content generation for anti-phishing education game , 2011, 2011 International Conference on Electrical and Control Engineering.

[14]  J. M. Gnanasekar,et al.  An Optimized Congestion Control and Error Management System for OCCEM , 2015 .

[15]  Samarendra Nath Sur,et al.  FEEDBACK EQUALIZER FOR VEHICULAR CHANNEL , 2017 .

[16]  J. M. Gnanasekar,et al.  Path Observation Based Physical Routing Protocol for Wireless Ad Hoc Networks , 2017, Wirel. Pers. Commun..

[17]  M. Rajesh,et al.  Congestion Control in Heterogeneous Wireless Ad hoc Network Using FRCC , 2015 .

[18]  Chokri Rekik,et al.  DESIGN AND DEVELOPMENT OF 3D PRINTED MYOELECTRIC ROBOTIC EXOSKELETON FOR HAND REHABILITATION , 2017 .

[19]  Canras Batunlu,et al.  SMART SENSING SYSTEM FOR ENHANCEING THE RELIABILITY OF POWER ELECTRONIC DEVICES USED IN WIND TURBINES , 2017 .

[20]  Paolo Visconti,et al.  Development and Characterization of a Solarbased Energy Harvesting and Power Management System for a WSN Node Applied to Optimized Goods Transport and Storage , 2016 .

[21]  Ryohei Egusa,et al.  EDA-BASED ESTIMATION OF VISUAL ATTENTION BY OBSERVATION OF EYE BLINK FREQUENCY , 2017 .

[22]  Hongtao Lu,et al.  An efficient web page watermarking scheme , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.