invisible captcha as graphical password

19
INVISIBLE CAPTCHA AS GRAPHICAL PASSWORD NETWORK SECURITY MOHAMED SATHAK A.J COLLEGE OF ENGINEERING PROJECT GUIDE : Mr. F.H.M AFZAL BIJLI ,B.Tech.,M.Tech. PROJECT CO-ORDINATOR : MR. A.ABDUL RAHMAN ,M.E.,Ph.D.

Upload: arulmurugan-kam

Post on 16-Aug-2015

42 views

Category:

Engineering


2 download

TRANSCRIPT

INVISIBLE CAPTCHA AS GRAPHICAL PASSWORD NETWORK SECURITY

MOHAMED SATHAK A.J COLLEGE OF ENGINEERING

PROJECT GUIDE : Mr. F.H.M AFZAL BIJLI ,B.Tech.,M.Tech.PROJECT CO-ORDINATOR : MR. A.ABDUL RAHMAN ,M.E.,Ph.D.

Abstract

Phishing is an attempt by an individual or a group to thieve personal confidential information.

New approach for phishing websites classification to solve the problem of phishing.

Original image captcha into two shares that are stored in separate database servers.

which we call Captcha as graphical passwords (CaRP). CaRP is both a Captcha and a graphical password scheme.

Cont..

Once the original image captcha is revealed to the user it can be used as the password.

Several solutions have been proposed to tackle phishing.

Important features that distinguish phishing websites from legitimate ones and assess.

Rule-based data mining classification techniques are in predicting phishing websites .

Classification technique is proven to be more reliable.

EXISTING SYSTEM

Phishing web pages are forged web pages that are created by malicious people to mimic Web pages of real web sites.

Most of these kinds of web pages have high visual similarities to scam their victims. Some of these kinds of web pages look exactly like the real ones.

Victims of phishing web pages may expose their bank account, password, credit card number, or other important information to the phishing web page owners.

PROPOSED SYSTEM

Online transactions are nowadays become very common and there are various attacks are present.

Identified as a major security threat and new innovative ideas .

It denotes the shares of a white pixel and a black pixel.

Choice of shares for a white and black pixel is randomly determined (there are two choices available for each pixel).

pixels in the secret image will be encrypted using independent random choices.

User Registration

Share1 User login

Phishing Server

Bank server

Share 2

Database

Share2

Secret key

Share1

Share2

Captcha not displayed

Captcha displayed

User Share

No Reply

Image Captcha created

Share1 Share2

Enter password and transaction

Fake site don’t give password

ARCHITECTURE DIAGRAM

ER-DIAGRAM

User

Name

Captcha Share(1)

Email id

Server

Captcha Share(2)

User Name

User Email id

User Password

Have

ANTI PHISHING FRAMEWORK

Do

Verification by share(1)

Do

Verification by share(2)

Password

DATA FLOW DIAGRAM

User Register With legitimate site

User Name

Password

String for captcha

LEVEL 0

Generate

Server Captcha for User string

Share 1(kept with User

Share2 (Kept server)

LEVEL 1

User Request With Share1

Reply Share2

Captcha Display with user key

Find Legitimate or phishing

LEVEL 2

Modules

Registration With Secrete Code

Image captcha Generation

Shares Creation

Login Phase

Registration With Secrete Code

In the registration phase, the user details user name, password, email-id, address, and a key string (password) is asked from the user at the time of registration for the secure website.

The key string can be a combination of alphabets and numbers to provide more secure environment.

This string is concatenated with randomly generated string in the server.

Image captcha Generation

A key string is converted into image using java classes Buffered Image and Graphics2D.

The image dimension is 260*60.

Text color is red and the background color is white. Text font is set by Font class in java.

After image generation it will be write into the user key folder in the server using Image IO class.

Shares Creation

The image captcha is divided into two shares such that one of the share is kept with the user and the other share is kept in the server.

The user's share and the original image captcha is sent to the user for later verification during login phase.

The image captcha is also stored in the actual database of any confidential website as confidential data.

Login Phase

When the user logs in by entering his confidential information for using his account, then first the user is asked to enter his username (user id).

Then the user is asked to enter his share which is kept with him.

This share is sent to the server where the user's share and share which is stored in the database of the website for each user, is stacked together to produce the image captcha.

The image captcha is displayed to the user.

Here the end user can check whether the displayed image captcha matches with the captcha created at the time of registration.

HOME PAGE

REGISTRATION PAGE

LOGIN PAGE

AFTER UPLOAD TO LOGIN PAGE