2018
DOI: 10.1002/cpe.5083
|View full text |Cite
|
Sign up to set email alerts
|

Preventing phishing attacks using text and image watermarking

Abstract: Summary Phishing is a form of identity theft used to illegally gather personal and financial information by providing fake web pages designed to mimic the website of a legitimate business. In this paper, we propose a novel anti‐phishing approach based on using imperceptible watermarking and monitoring the HTTP requests. In the server‐side, a URL dependent watermark is generated and embedded in the elements of the web page, which are logo image and HTML/CSS files. In the client side, to authenticate the website… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 27 publications
0
4
0
Order By: Relevance
“…Selection of the suitable replica and accessing a data file become a significant issue in any distributed environment. This process can decrease the probability of the attack and enhance security [26]. Knowledge about the capabilities and performance features of a storage system is a fundamental issue for replica selection.…”
Section: Proposed Methodsmentioning
confidence: 99%
“…Selection of the suitable replica and accessing a data file become a significant issue in any distributed environment. This process can decrease the probability of the attack and enhance security [26]. Knowledge about the capabilities and performance features of a storage system is a fundamental issue for replica selection.…”
Section: Proposed Methodsmentioning
confidence: 99%
“…A systematic measure of the infiltration process involved in phishing detection along with the application for chrome extension, namely, Sniff-Phish, was developed in [18], where the computational time involving the resource-intensive model in cloud was designed to detect several types of phishing attacks, thus minimizing the false positive significantly. Text and image watermarking tools [19] were used as means for detecting between phishing attack and normal traffic. Here, watermark was used in the client side and was found to be fool proof.…”
Section: Structurementioning
confidence: 99%
“…Color image watermarking is quite like the grayscale watermarking, but only the difference is, there are three color components like red, green, and blue. Recently, the interest in security of copyrights have been enhanced in several fields like military, bioinformatics, medical, 16 biometric, 13 and webserver applications, 17 and so on.…”
Section: Introductionmentioning
confidence: 99%