Information Technology Journal1812-56381812-5646Asian Network for Scientific Information10.3923/itj.2013.198.203HuangHuajun WangYaojun XieLili JiangLiqing 12013121Although anti-phishing solutions were highly publicized, phishing has been still an important serious problem. One of the main reasons was that phishers cost little to change their targets by copying and then to modify a legitimate sites web pages. In this study, a novel active anti-phishing solution based on semi-fragile watermark was proposed to protect online service provider. Firstly, the semi-fragile watermark was consisted of URL, website identity characters and singular heuristics occurred in phishing attack and actively embedded into the webpage tag by the provider. As a suspicious website was met, the inconsistence of the generated semi-fragile watermark and the extracted information indicated the phishing attack. Simulating phishing experiments shown the solution could effectively thwart the phishing attack by downloading the tactics webpage and modifying a little to lure the victims.]]>Abbasi, A., Z. Zhang, D. Zimbra, H. Chen and J.F. Nunamaker Jr.,201034435461APAC,20112011CNERT/CC,20102010APWG,20072007Chen, T.C., S. Dick and J. Miller,201010138He, M., S.J. Horng, P. Fan, M.K. Khan and R.S. Run et al.,2011381201812027Hong, J.,2012557481Huang, C.Y., S.P. Ma, W.L. Yeh, C.Y. Lin and C.T. Liu,20102010pp: 803808Huang, H.J., L. Qian and Y.J. Wang,201211921925Khatibi, A., A. Haque and K. Karim,20066696705Singh, A.P., V. Kumar, S.S. Sengar and M. Wairiya,2011147132137Steel, C.M.S. and C.T. Lu,200856070Sudha, R., A.S. Thiagarajan and A. Seetharaman,200710102106Sun, X.M., H.J. Huang, B.W. Wang, G. Sun and J. Huang,200744756760Topkara, M., A. Kamra, M.J. Atallah and C. Nita-Rotaru,20052005pp: 470483Xiang, G., J. Hong, C.P. Rose and L. Cranor,2011142148Zhang, H., G. Liu, T.W.S. Chow and W. Liu,20112215321546