Student from the Department of Computer Science obtain PH degree from a proposal to prevent phishing pages attack

Back

Student from the Department of Computer Science obtain PH degree from a proposal to prevent phishing pages attack

Student Rajaa Kadhim Hassoun got PH degree from the Department of Computer Science at the University of Technology for her thesis tagged (proposed to prevent phishing pages attack) in the debate, which was held on Tuesday, 03.01.2017.
The committee discussion consisted of.dr.Saad star Bachikh of Computer Science at the University of Mustansiriya , dr. Nidaa Falih Hassan, dr. Alaa Kadhim from the Computer Science Department at the University of Technology and dr.Haidar Kadhom Hammoud from Computer Science at the University of Mustansiriya.
In this thesis has been proposed to authorize a secure system between two locations (the beneficiary and reliable site e-business), the proposed security system consists of two phases: phase of registration and the process of authorization. In the process of registration The beneficiary enrolled in trusted site using more than one technology, such as discrimination fingerprint to identify the beneficiary, have been improved discrimination fingerprint system by using (Filter Kapoor) in a move that primary treatment, the use of the integration of images for the purpose of deception and the use of visual encryption as a kind of post squadrons beneficiary reliable, and location, in order to provide a secure transmission channel between the beneficiary authorized and reliable site was used one-time encryption to encrypt the merged image as well as two of the participating shares resulting from the visual encryption.
The process of authorization consists of three levels of security, the first level through verification of fingerprints beneficiary, the second-level collection of magistrates for a merged image of confidentiality. The third level through the use of image verification. In the proposed system was used for the purpose of merging images of deception where the use of different functions ripple Despite the lack of a function better than the other but the experience created a technique that mergers on average give better results when compared with other techniques. Good visual encryption technology to share the secret but used with the one-time secret encryption give more as the mismatch between the encrypted image and explicit factor be close to zero. Number of samples the encryption key generated was evaluated using the five tests as the key passed most tests successfully randomized.
The proposed system experiment on three models of databases and the results were as as follows: first the database consists of (80) a sample of (10) people have the system gave accuracy (99.92%) and accept the sinner (0067) and the proportion of erroneous rejection ( 0.1). The second database also consists of (80) a sample of 10 people and gave accuracy (99.9%) by accepting a fault (0%) proportion of erroneous rejection (0.2). Third real database collected by the use of sensors to read the fingerprint ZK4500 and consists of 104 samples from 13 people and gave accuracy (99.98%) by accepting a sinner (0%) and the proportion of erroneous rejection (0033).
The proposed system uses two types of image CAPTCHA (text and photo) to distinguish between humans and malware. Evaluate the efficiency of both types gave 100% accuracy.

Source : Uot Media Date :2/2/2017