Authenticated Framework for Security Based on Imperceptible Captcha
|International Journal of Computer Science and Engineering|
|© 2016 by SSRG - IJCSE Journal|
|Volume 3 Issue 5|
|Year of Publication : 2016|
|Authors : Ameerabanu .B, Niaz Ahamed .V .M|
How to Cite?
Ameerabanu .B, Niaz Ahamed .V .M, "Authenticated Framework for Security Based on Imperceptible Captcha," SSRG International Journal of Computer Science and Engineering , vol. 3, no. 5, pp. 38-42 , 2016. Crossref, https://doi.org/10.14445/23488387/IJCSE-V3I5P107
Phishing is a lawless activity using social work techniques information such as online banking secret codes and credit card drive information from end users. Phishers attempt to fraudulently acquire sensitive information, such as secret codes and credit card drive details, by disguising as a trustworthy person or business in an electronic communication”, new approach which is used as a safe way against phishing which is named as “ Captcha based security". Server cross verifies its login details and proves that it is a genuine website before the end users and make both the sides of the system secured. Visual Cryptography (VC) is a method of encipher a hidden image to some fragment, such that it reveals the encipher image.
Online banking, Random Grid, Visual Cryptography Technique, Authentication, Advanced Phishing Detection System.
 “The Effectiveness of Security Images in Internet Banking”, Joel Lee and Lujo Bauer Carnegie Mellon University Michelle L. Mazurek University of Marylandhttp://www.internationaljournalssrg.org/IJCS E/2016/Special Issues/ICEIET/IJCSE-ICEIETP129. pdfk:
 “Authentication Protocol For Security Based Captcha As A Countersign On Hard Ai Problems”, International Journal of Technology and Engineering System (IJTES) Vol 7. No.2 2015 Pp. 118-123 ©gopalax Journals, Singapore
 “Online Banking End user Interface: Perception and Attitude”,2015 IEEE 2015 International Conference on Computer,Communication, and Control Technology (I4CT 2015), April 21 – 23 in Imperial Kuching Hotel,Kuching,Sarawak, Malaysia.
 “E-Mail Phishing-An open threat to everyone”, Gori Mohamed .J, M. Mohammed Mohideen, Mrs.Shahira Banu. N/International Journal of Scientific and Research Publications, Volume 4, Issue 2, February 2014 1 ISSN 2250-3153
 J. Kirk, “Study: End users ignore bank security features,” Computerworld,Feb. 2007,
http://www.computerworld.com/s/article/9010283/. Bank of America, “SiteKey FAQs,” https://www.bankofamerica.com/privacy/faq/sitekeyfaq. go, 2013.
 PNC, “Online security information,” https://www.pnc.com/webapp/unsec/Solutions.do?siteA rea=/pnccorp/PNC/Security+Information, 2013.
 Santander Bank, “SSA makes online banking even more secure,”https://www.santanderbank.com/us/personal/ba nking/online-and-mobilebanking/security-center/ssalearn- more, 2014.
 S. Schechter, R. Dhamija, A. Ozment, and I. Fischer, “The emperor’s new security indicators: An evaluation of website authentication and the effect of role playing on usability studies,” in Proceedings of the 28th IEEE Symposium on Security and Privacy, Berkeley, CA, USA, 2007,pp. 51–65.
 R. Biddle, S. Chiasson, and P. C. van Oorschot, “Graphical secret codes: Learning from the first twelve years,” ACM Comput. Surveys, vol. 44, no. 4, 2012.
 (2012, Feb.). The Science BehindPassfaces[Online]. Available: http://www.realend user.com/published/ScienceBehindPassfaces.pdf
 Jermyn, A. Mayer, F. Monrose, M. Reiter, and A. Rubin, “The design and analysis of graphical secret codes,” in Proc. 8th USENIX Security Symp., 1999, pp. 1–15.