Protecting User Authentication with Visual Cryptography Against Phishing Attacks

Authors

  • Kader Abdelkader India Author

Keywords:

Phishing attacks , visual cryptography

Abstract

Phishing attacks remain a significant threat to user authentication in online environments, exploiting human vulnerabilities through deceptive communication. Traditional methods of authentication, such as passwords and security questions, are often insufficient against sophisticated phishing tactics. Visual cryptography emerges as a promising approach to enhance authentication security by leveraging images and cryptographic techniques. This paper explores the effectiveness of visual cryptography in mitigating phishing attacks by presenting a comprehensive review of existing methodologies and their application in safeguarding user authentication. Key considerations include the integration of visual cryptography into existing authentication frameworks, usability implications, and comparative analysis with traditional methods. The findings suggest that visual cryptography offers a robust defense mechanism against phishing threats, contributing to a more secure online authentication environment.

References

Monrose, F., Rubin, A. D., & Kerschbaum, F. (2001). Towards Visual Cryptography-Based Authentication of Physical Items. In International Conference on Financial Cryptography (pp. 245-259). Springer, Berlin, Heidelberg.

Naor, M., & Shamir, A. (1994). Visual Cryptography. In Advances in Cryptology - EUROCRYPT '94 (pp. 1-12). Springer, Berlin, Heidelberg.

Wang, C. C., & Lin, C. C. (2006). Using Visual Cryptography to Enhance Security in Mobile Communication. In International Conference on Computational Science and Its Applications (pp. 1195-1204). Springer, Berlin, Heidelberg.

Yang, C. N., Tseng, Y. M., & Chen, T. S. (2008). A Secure Authentication Scheme Using Visual Cryptography. Journal of Network and Computer Applications, 31(4), 885-895.

Published

2013-08-03

How to Cite

Protecting User Authentication with Visual Cryptography Against Phishing Attacks. (2013). JOURNAL OF RECENT TRENDS IN COMPUTER SCIENCE AND ENGINEERING ( JRTCSE), 1(2), 11-19. https://jrtcse.com/index.php/home/article/view/JRTCSE.2013.2.2