Abstract
In this paper, we present a watermarking based approach, and its implementation, for mitigating phishing attacks – a form of web based identity theft. ViWiD is an integrity check mechanism based on visible watermarking of logo images. ViWiD performs all of the computation on the company’s web server and it does not require installation of any tool or storage of any data, such as keys or history logs, on the user’s machine. The watermark message is designed to be unique for every user and carries a shared secret between the company and the user in order to thwart the “one size fits all” attacks. The main challenge in visible watermarking of logo images is to maintain the aesthetics of the watermarked logo to avoid damage to its marketing purpose yet be able to insert a robust and readable watermark into it. Logo images have large uniform areas and very few objects in them, which is a challenge for robust visible watermarking. We tested our scheme with two different visible watermarking techniques on various randomly selected logo images.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Martinez, S.M.: Identity theft and cyber crime (September 2004), Federal Bureau of Investigation, http://www.fbi.gov/congress/congress.htm
Symantec internet security threat report highlights rise in threats to confidential information, http://www.symantec.com/press/2005/n050321.html
The Anti-Phishing working group, http://www.antiphishing.org
Chou, N., Ledesma, R., Teraguchi, Y., Mitchell, J.C.: Client-side defense against web-based identity theft. In: Proceedings of the Network and Distributed System Security Symposium (2004)
Netcraft, http://www.netcraft.com
ebay: buyer tools: toolbar, http://pages.ebay.com/ebay_toolbar/
Preventing man in the middle phishing attacks with multi-factor authentication, http://www.tricipher.com/solutions/phishing.html
Ellison, C., Schneier, B.: Inside risks: Risks of PKI: secure email. Communications of the ACM 43(1), 160 (2000)
Herzberg, A., Gbara, A.: Trustbar: Protecting (even nave) web users from spoofing and phishing attacks. Cryptology ePrint Archive, Report 2004/155 (2004)
Security, P.: Protecting your customers from phishing attacks - an introduction to passmarks, http://www.passmarksecurity.com/
Dhamija, R., Tygar, J.: The battle against phishing: Dynamic security skins. In: Symposium on Usable Provacy and Security (SOUPS) (July 2005)
Wu, T.: The secure remote password protocol. In: Internet Society Network and Distributed Systems Security Symposium (NDSS), March 1998, pp. 97–111 (1998)
Memon, N., Wong, P.W.: Protecting digital media content. Commun. ACM 41(7), 35–43 (1998)
Huang, C.-H., Wu, J.-L.: Attacking visible watermarking schemes. IEEE Transactions on Multimedia 6(1) (February 2004)
Imagemagick studio llc, http://www.imagemagick.org
Mohanty, S.P., Ramakrishnan, K.R., Kankanhalli, M.: A dual watermarking technique for images. In: MULTIMEDIA 1999: Proceedings of the seventh ACM international conference on Multimedia (Part 2), pp. 49–51. ACM Press, New York (1999)
Braudaway, G.W., Magerlein, K.A., Mintzer, F.C.: Protecting Publicly Available Images with a Visible Image Watermark. In: Proceedings of the SPIE International Conference on Electronic Imaging, San Jose, CA, February 1-2, vol. 2659 (1996)
Ollman, G.: The phishing guide, http://www.ngssoftware.com/papers/NISR-WP-Phishing.pdf
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Topkara, M., Kamra, A., Atallah, M.J., Nita-Rotaru, C. (2005). ViWiD : Visible Watermarking Based Defense Against Phishing. In: Barni, M., Cox, I., Kalker, T., Kim, HJ. (eds) Digital Watermarking. IWDW 2005. Lecture Notes in Computer Science, vol 3710. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11551492_36
Download citation
DOI: https://doi.org/10.1007/11551492_36
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28768-1
Online ISBN: 978-3-540-32052-4
eBook Packages: Computer ScienceComputer Science (R0)