Android Controlled Remote Password Security

Android Controlled Remote Password Security

8051 Microcontroller, Android Mobile development, Security and Encryption
Android Controlled Remote Password Security Our project aims at a system that provides the required authority, the ability to change the password as and when needed. Organizational security is an important factor these days. This is applicable to intellectual as well as physical property security. Our system aims to provides an improved security systems to domestic and organizational industry. Our project has a system that is configured to allow authorized person with a password. A password changing provision is also provided along with it. The password entering feature is provide through remote access. The remote access is provided with the use of an android application that is to be run on any android operated device. The app provides an interactive GUI for this system. The system is operated using an…
Read More
Configurable Password Security System

Configurable Password Security System

8051 Microcontroller, Security and Encryption
Zero Configurable Password Security System The project is a security system which allows only authorized access to users with a password. The system has a feature of changing the password anytime by the authorized user as required. The project comprises of a microcontroller of 8051 family that is interfaced to an EEPROM which stores the password. The project requires a keypad to enter password, and a Motor Driver that is interfaced to microcontroller for locking or unlocking a door or any security system. An alert would be produced if there is any wrong attempt and a door open if the attempt is right. The project can be used for security purposes in home, offices, organizations etc. This proposed system provides a user friendly security system for organizations and homes. This…
Read More
RF Secure Coded Communication System

RF Secure Coded Communication System

8051 Microcontroller, Security and Encryption
RF Secure Coded Communication System Our project enables users to send secret codes by entering messages through computer keyboard and sending the code through RF transmitters. This secret code sent is received through an RF receiver. The rest functionality is performed at receiving end thus maintaining confidentiality of the message. The system is designed to be used for secret code transmissions needed in military, government or other sensitive communications. User may type his message through a computer keyboard. This is then processed by an 8051 microcontroller and delivered to the receiver end wirelessly. This system has a secret code attached to the transmission. The message typed in by user is transmitted to the receiving end through an RF transmitter. At the receiving end the RF receiver is integrated with a…
Read More

Video Surveillance Project

Image Processing, Security and Encryption, Web | Desktop Application
Video Surveillance Project This is an innovative approach to video surveillance software project. We normally find video camera?s in banks and other organization that continuously record and save the recorded video footage for days or months. This utilizes a lot of battery life and storage capacity to store these large video footage. Well this video surveillance software is an enhanced version of organization security that continuously monitors but only records unusual changes in the organization. These unusual changes may include theft detection or fire detection in offices. It may also include rodent detection in bakeries or restaurants after closing. As soon as the system catches any unusual activity it takes steps and informs the user by: 1. Sending an sms to the user about an unusual activity. 2. Sending an…
Read More

Graphical Password By Image Segmentation

Image Processing, Security and Encryption, Web | Desktop Application
Graphical Password By Image Segmentation The project allows user to input an image as its password and only user knows what the image looks like as a whole. On receiving the image the system segments the image into an array of images and stores them accordingly. The next time user logs on to the system the segmented image is received by the system in a jumbled order. Now if user chooses the parts of image in an order so as to make the original image he sent then user is considered authentic. Else the user is not granted access. The system uses image segmentation based on coordinates. The coordinates of the segmented image allow the system to fragment the image and store it in different parts. Actually system segments the…
Read More

Detecting Data Leakage

Data mining, Security and Encryption, Web | Desktop Application
Detecting Data Leaks This project addresses various data leakage problems: Consider a data sender who transfers some confidential data to some of his counterparts (third party). Some of this sensitive data gets leaked accidentally or purposely by an attacker and is downloaded on his terminal. The distributor must find the possibilities that the compromised data was from one or more of his counterparts, as opposed to having gathered by other means. So our project allows for data allocation tactics (through the counterparts) that improves the chances of identifying data leakages. These methods do not depend on various alterations of the transferred data like parity. In some of the cases, we can also insert ?realistic but fake? data records into the data stream to further improve our chances of identifying unknown…
Read More

Automatic Answer Checker

Artificial Intelligence & ML, Data mining, Image Processing, Security and Encryption, Sensor, Web | Desktop Application
Automatic Answer Checker An automatic answer checker application that checks and marks written answers similar to a human being. This software application is built to check subjective answers in an online examination and allocate marks to the user after verifying the answer. The system requires you to store the original answer for the system. This facility is provided to the admin. The admin may insert questions and respective subjective answers in the system. These answers are stored as notepad files. When a user takes the test he is provided with questions and area to type his answers. Once the user enters his/her answers the system then compares this answer to original answer written in database and allocates marks accordingly. Both the answers need not be exactly same word to word.…
Read More

Document checker and Corrector Project

Artificial Intelligence & ML, Data mining, Image Processing, Security and Encryption, Web | Desktop Application
Document checker and Corrector Project HECKS YOUR .DOC OR .DOCX FILES IN THIS YOU CAN ATTACH FOLDER OF WORD DOCS AND THEN THE BELOW CONDITIONS CAN BE CHECKED IN THOSE DOC FILES AND ERROR REPORTS CAN BE GENERATED: ? All the pages must be seprate files, i.e 800 pages will be 800 files. ? All formatting should be in inches (?). ? FILE : Page set up : Top-Bottom-Left-Right 0.25?& Gutter: 0.5? Paper size A4, Layout: header/footer 0.7? ? Heading first ? Heading Style 1 ? Arial ? 16 ? Bold ? Heading second ? Heading Style 2 ? Arial ? 14 ? Bold & Italic. ? Heading third ? Heading Style 3 ? Arial ? 13 ? Bold & Italic. Use only in Header & Footer ? Heading position…
Read More

Student Attendance System by Barcode Scan

Artificial Intelligence & ML, Data mining, Image Processing, Security and Encryption, Web | Desktop Application
Student Attendance System by Barcode Scan The project is a system that takes down students? attendance using barcode. Every student is provided with a card containing a unique barcode. Each barcode represents a unique id of students. Students just have to scan their cards using barcode scanner and the system notes down their attendance as per dates. System then stores all the students? attendance records and generates defaulter list. It also generates an overall report in excel sheet for admin. Such kind of application is very useful in school as well as in college for daily attendance.
Read More

Face Recognition Attendance System

Artificial Intelligence & ML, Data mining, Image Processing, Security and Encryption, Web | Desktop Application
Face Recognition Attendance System The system is developed for deploying an easy and a secure way of taking down attendance. The software first captures an image of all the authorized persons and stores the information into database. The system then stores the image by mapping it into a face coordinate structure. Next time whenever the registered person enters the premises the system recognizes the person and marks his attendance along with the time. It the person arrives late than his reporting time, the system speaks a warning ?you are xx minutes late! Do not repeat this.? Note: This system has around 40%-60% accuracy in scanning and recognizing faces.
Read More

Secure Lab Access Using Card Scanner Plus Face Recognition

Image Processing, Security and Encryption, Web | Desktop Application
Secure Lab Access Using Card Scanner Plus Face Recognition Research laboratories funded by private or government organizations are of strategic importance to a country. A lot of sensitive research is carried on in such laboratories. The confidentiality of such premises is of prime importance for the benefit of the society. At such time it becomes necessary to ensure high level authentication and authorization of personnel entering such facilities. A single form of authentication/authorization is not enough for these sensitive organizations. Here we propose a system that combines two different forms of authentication techniques to ensure only authorized persons access the premises. Our system integrates biometrics with secure card to create a dual secure high end security system never implemented before. The system first checks if the persons face is registered…
Read More

Military Access Using Card Scanning With OTP

Security and Encryption, Sensor, Web | Desktop Application
Military Access Using Card Scanning With OTP Military access is the most secure access provision and needs to be kept that way considering national security issues. Usual military authentication and authorization techniques consist of one way authentication techniques with just one form of authentication, namely password or smart card or biometric. Here we propose a two stage authentication/authorization technique for secured military access to authorized personnel. The first stage is a card scanning system, each authorized personnel must have a smart card. On card scanning the system also asks of an additional 4 digit code associated with it, on entering the right code the personnel goes to the next stage of authentication. On the next stage, system generates a one time password and sends to the mobile phone registered to…
Read More

Secure ATM Using Card Scanning Plus OTP

Security and Encryption, Web | Desktop Application
>Secure ATM Using Card Scanning Plus OTP Our project proposes a secured ATM (Any time Money) system using a card scanning system along with Otp password system on sms for improved security. Usual ATM systems do not contain the OTP feature for money withdrawal. If an attacker manages to get hold of ATM card and the pin number he may easily use it to withdraw money fraudently. So our proposed system supports the ATM card scanning system along with an OTP system. Ths user may scan his card and login to the system .But after user is through with this authentication he may view details but is asked to enter OTP as soon as he clicks money withdrawal option. At this stage the system generates and sends a One time…
Read More

Secure Remote Communication Using DES Algorithm

Cloud Computing, Security and Encryption, Web | Desktop Application
Secure Remote Communication Using DES Algorithm The Data Encryption Standard (DES) algorithm is a widely accepted system for data encryption that makes use of a private (secret) key that was judged so hard to break by the U.s. government that it was confined for exportation to different nations. There are more than 71,000,000,000,000,000 (71 quadrillion) encryption keys to be used in this algorithm. For any given message, the key is picked at irregular interval from among this colossal number of keys. Like other private key cryptographic routines, both the sender and the collector must know and utilize a common private key. Many companies, governments, military and other fields make use of DES algorithm for secure data transfer over unsecure networks. We here propose a system for secured data transfer over…
Read More

Image Steganography With 3 Way Encryption

Security and Encryption, Web | Desktop Application
Name Image Steganography With 3 Way Encryption Technology DotNET,MS SQL Category Web Application Description Steganography is the technique of hiding private or sensitive information within something that appears to be nothing be a usual image. Steganography involves hiding Text so it appears that to be a normal image or other file. If a person views that object which has hidden information inside, he or she will have no idea that there is any secret information. What steganography essentially does is exploit human perception, human senses are not trained to look for files that have information inside of them. What this system does is, it lets user to send text as secrete message inside an image file, user uploads the image and enters the text to send secretly, and gives a…
Read More

Secure File Storage On Cloud Using Hybrid Cryptography

Cloud Computing, Security and Encryption, Web | Desktop Application
Secure File Storage On Cloud Using Hybrid Cryptography The proposed software product is liable to meet the required security needs of data center of cloud. Blowfish used for the encryption of file slices takes minimum time and has maximum throughput for encryption and decryption from other symmetric algorithms. The idea of splitting and merging adds on to meet the principle of data security. The hybrid approach when deployed in cloud environment makes the remote server more secure and thus, helps the cloud providers to fetch more trust of their users. For data security and privacy protection issues, the fundamental challenge of separation of sensitive data and access control is fulfilled. Cryptography technique translates original data into unreadable form. Cryptography technique is divided into symmetric key cryptography and public key cryptography.…
Read More

ATM Detail Security Using Image Steganography

Security and Encryption, Web | Desktop Application
ATM Detail Security Using Image steganography Now you can securely perform your ATM transactions with the help of this system as it provides 3 level of security. This system works as follows. Once the user enters the PIN, the user is prompted to enter the OTP (One Time Password) which is a 4-digit random password sent by the server to the user’s registered mobile number. On cross verification with the data stored in the system database, the user is allowed to make a transaction. The underlying mechanism involves combining the concepts of Cryptography and Steganography. The PIN and OTP are encrypted using AES 256. Then the encrypted data is steganographed with the image selected by the user which acts as the BASE image. The Steganographed image is sent to the…
Read More

Image Steganography Using Kmeans & Encryption

Security and Encryption, Web | Desktop Application
Image Steganography Using Kmeans & Encryption Steganography involves hiding of text, image or any sensitive information inside another image, video or audio in such a way that an attacker will not be able to detect its presence. Steganography is, many times, confused with cryptography as both the techniques are used to secure information. The difference lies in the fact that steganography hides the data so that nothing appears out of ordinary while cryptography encrypts the text, making it difficult for an outsider to infer anything from it even if they do attain the encrypted text. Both of them are combined to increase the security against various malicious attacks. Image Steganography uses an image as the cover media to hide the secret message. In this paper, we propose an image steganography…
Read More

Android Text Encryption Using Various Algorithms

Android Mobile development, Security and Encryption, Web | Desktop Application
Android Text Encryption Using Various Algorithms Users communicate over all social media, but messages are not secured when it passes through network. Intruder can access user’s message easily. We want to secure users communication over all social media. So here we proposed a system where user will enter the plain text and select the algorithm type from AES,DES,MD5,….. and provide the key, a chipper text will be formed that can be sent via any communication application and end user can decrypt the text by selecting the same algorithm type and must enter the same sender secret key. User can use our application and can enter the plain text and must select the algorithm type and must enter the secret key to encrypt the message and receiver can decrypt the message…
Read More

Image Encryption For Secure Internet Transfer

Networking, Parallel And Distributed System, Security and Encryption, Web | Desktop Application
Image Encryption For Secure Internet Transfer Encryption is commonly used for encryption of text as well as images. Various encryption algorithms exist for this purpose. Here we propose to build a secured image encryption algorithm that can be used to encrypt as well as send images remotely to the intended receiver. Our system can link to remote client to our software installed on remote system and connect to it for image transfer. Our system uses RSA algorithm for this purpose. User may submit his image for encryption. Our system now gets the image and converts it into hex format before being encrypted. Then we use RSA algorithm to encrypt the image for sending through the internet. User may now select the intended user from among the list of users having…
Read More

Secure Data Transfer Over Internet Using Image Steganography

Cloud Computing, Networking, Parallel And Distributed System, Security and Encryption, Web | Desktop Application
Secure Data Transfer Over Internet Using Image Steganography Steganography is the technique of hiding private or sensitive information within something that appears to be nothing be a usual image. Steganography involves hiding Text so it appears that to be a normal image or other file. If a person views that object which has hidden information inside, he or she will have no idea that there is any secrete information. What steganography essentially does is exploit human perception, human senses are not trained to look for files that have information inside of them. What this system does is, it lets user to send text as secrete message inside an image file, user uploads the image and enters the text to send secretly, and gives a key or a pass word to…
Read More

Sending a secure message over a network to a remote site

Parallel And Distributed System, Security and Encryption, Web | Desktop Application
Sending a secure message over a network to a remote site We here use a system to securely transfer a message encrypted using Aes algorithm to a remote site so that only proper authentication at remote site can decrypt the message. The system also uses acknowledgements to signal the message integrity and delivery over the network. The system consists of two terminal applications running concurrently over two different PC’s. User may first use the sending tab to send a secure message. On using this function the accepts user string and key to encrypt it. The system then receives this message and encrypts it using AES algorithm. Now the system transfers this message to remote site using over a Tcp/ip internet connection. The receiving system sends out a notification acknowledgement to…
Read More

Improved Data Leakage Detection

Parallel And Distributed System, Security and Encryption, Web | Desktop Application
Improved Data Leakage Detection Data leakage detection techniques are built for users to track if data has been leaked and the trace the sources of data leakage. Many times we come across cases where leaked data is found at unauthorized places. For example we may find sensitive data stored on an unauthorized laptop or website. At such a time it becomes important to trace the source of data leakage. For this purpose we propose an improved data leakage detection technique to trace back sources of unauthorized leakage by using a strategy of data allocation across various agents. The strategy allows user to transfer data to users by considering receivers as agents who are allocated data along with some id based undetectable alterations. These alterations allow our system to trace back…
Read More

Secure Electronic Fund Transfer Over Internet Using DES

Networking, Parallel And Distributed System, Security and Encryption, Web | Desktop Application
Secure Electronic Fund Transfer Over Internet Using DES Nowadays people often need to transfer cash from one account to another. In such cases they need to go to bank or search for PC connected to internet to get access to the services offered by internet banking for reliable fund transfer. This system proves to be really beneficial in such cases. As with the help of this system the user just needs to enter the account details. For security, DES algorithm is used along with instant verification and consistency check algorithm. All these are performed for secure electronic fund transfer. Thus a user just needs to visit any EFT center, in order to make the payment. The transfer is done instantly using a single portable card. In this way the user…
Read More

Unique User Identification Across Multiple Social Networks

Multimedia, Security and Encryption, Web | Desktop Application
Unique User Identification Across Multiple Social Networks There are number of social network sites that connect a large amount of people around the world. All social networking sites differ from each other based on various components such as Graphical User Interface, functionality, features etc. Many users have virtual identities on various social network sites. It is common that people are users of more than one social network and also their friends may be registered on multiple social network sites. User may login to different social networking sites at different timing, so user may not find his friends online when he logins to the particular social networking website. To overcome this issue our proposed system will bring together our online friends on different social networking sites into a single integrated environment.…
Read More

A New Hybrid Technique For Data Encryption

Networking, Security and Encryption, Web | Desktop Application
A New Hybrid Technique For Data Encryption Data encryption has been widely applied in many data processing areas. Various encryption algorithms have been developed for processing text documents, images, video, etc. If we are able to collaborate the advantages of the different existing encryption methods, then a new hybrid encryption method can be developed which offers better security and protection. So, in order to accomplish the Hybrid encryption technique, data encryption techniques using Fibonacci series, XOR logic, PN sequence are studied, analyzed and their performance is compared in this paper. The message is divided into three parts and these three different techniques are applied to these parts and the performance is again analyzed. The application of these three different methods to different parts of the same message along with two…
Read More

High Security Encryption Using AES & Visual Cryptography

Multimedia, Networking, Security and Encryption, Web | Desktop Application
High Security Encryption Using AES & Visual Cryptography A novel and highly secure encryption methodology using a combination of AES and visual crypto. With the ever increasing human dependency on The Internet for performing various activities such as banking, shopping or transferring money, there equally exists a need for safe and secure transactions. This need a system that automatically translates to the requirement of increased network security and better and fast encryption algorithms. This system addresses the above issue by introducing a novel methodology by utilizing the AES method of encryption and also further enhances the same with the help of visual cryptography. In this method the secret message is divided into two parts after which the message the first half of the message is encrypted using AES and the…
Read More

Data Duplication Removal Using File Checksum

Multimedia, Parallel And Distributed System, Security and Encryption, Web | Desktop Application
Data Duplication Removal Using File Checksum Data duplication technology usually identifies redundant data quickly and correctly by using file checksum technique. A checksum can determine whether there is redundant data. However, there are the presences of false positives. In order to avoid false positives, we need to compare a new chunk with chunks of data that have been stored. In order to reduce the time to exclude the false positives, current research uses extraction of file data checksum. However, the target file stores multiple attributes such as user id, filename, size, extension, checksum and date-time table. Whenever user uploads a particular file, the system then first calculates the checksum and that checksum is cross verified with the checksum data stored in database. If the file already exists, then it will…
Read More

Encryption & Decryption Using Deffie Hellman Algorithm

Multimedia, Security and Encryption, Web | Desktop Application
Encryption & Decryption Using Deffie Hellman Algorithm The spectacular growth of the Internet has spawned an increased awareness of and interest in security issues. Although security has been considered in the design of the basic Internet protocols, many applications have been and are being designed with minimal attention paid to issues of confidentiality, authentication, and privacy. As our daily activities become more and more reliant upon data networks, the importance of an understanding of such security issues will only increase. Many cryptographic algorithms (e.g., DES, AES) require the establishment of shared keying material in advance. Manual distribution of keying material is inefficient and complex. This is where the Diffie-Hellman Key Agreement algorithm is useful. The project is developed using Visual Studio with C# .Net as programming language. There is only…
Read More

Data Standardization Using Hidden Markov Model

Security and Encryption, Web | Desktop Application
Data Standardization Using Hidden Markov Model Record linkage refers to the process of joining records that relate to the same entity or event in one or more data collections. In the absence of a shared, unique key, record linkage involves the comparison of ensembles of partially-identifying, non-unique data items between pairs of records. Data items with variable formats, such as names and addresses, need to be transformed and normalized in order to validly carry out these comparisons. Traditionally, deterministic rule-based data processing systems have been used to carry out this pre-processing, which is commonly referred to as “standardization”. This project describes an alternative approach to standardization, using a combination of lexicon-based tokenization and probabilistic Hidden Markov Models (HMMs). The project is developed using Visual Studio with C# .Net as programming…
Read More

Secure Electronic Fund Transfer Over Internet Using DES

Security and Encryption, Web | Desktop Application
Secure Electronic Fund Transfer Over Internet Using DES Nowadays people often need to transfer cash from one account to another. In such cases they need to go to bank or search for PC connected to internet to get access to the services offered by internet banking for reliable fund transfer. This system proves to be really beneficial in such cases. As with the help of this system the user just needs to enter the account details. For security, DES algorithm is used along with instant verification and consistency check algorithm. All these are performed for secure electronic fund transfer. Thus, a user just needs to visit any EFT center, in order to make the payment.The transfer is done instantly using a single portable card. In this way the user can…
Read More

Policy-by-Example for Online Social Networks.

Cloud Computing, Data mining, Security and Encryption
Policy-by-Example for Online Social Networks We introduce two approaches for improving privacy policy management in online social networks. First, we introduce a mechanism using proven clustering techniques that assists users in grouping their friends for group based policy management approaches. Second, we introduce a policy management approach that leverages a user's memory and opinion of their friends to set policies for other similar friends. We refer to this new approach as Same-As Policy Management. To demonstrate the e ectiveness of our policy management improvements, we implemented a prototype Facebook application and conducted an extensive user study. Leveraging proven clustering techniques, we demonstrated a 23% reduction in friend grouping time. In addition, we demonstratedconsiderable reductions in policy authoring time using Same As Policy Management over traditional group based policy management approaches. Finally,…
Read More

Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

Cloud Computing, Networking, Security and Encryption, Web | Desktop Application
Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity and frequent partitions. Disruption-tolerant network (DTN) technologies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by exploiting external storage nodes. Some of the most challenging issues in this scenario are the enforcement of authorization policies and the policies update for secure data retrieval. Ciphertext-policy attribute-based encryption (CP-ABE) is a promising cryptographic solution to the access control issues. However, the problem of applying CP-ABE in decentralized DTNs introduces several security and privacy challenges with regard to the attribute revocation, key escrow, and coordination of attributes issued…
Read More

Product Aspect Ranking and Its Applications

Cloud Computing, Data mining, Security and Encryption, Web | Desktop Application
Product Aspect Ranking and Its Applications Numerous consumer reviews of products are now available on the Internet. Consumer reviews contain rich and valuable knowledge for both firms and users. However, the reviews are often disorganized, leading to difficulties in information navigation and knowledge acquisition. This article proposes a product aspect ranking framework, which automatically identifies the important aspects of products from online consumer reviews, aiming at improving the usability of the numerous reviews. The important product aspects are identified based on two observations: 1) the important aspects are usually commented on by a large number of consumers and 2) consumer opinions on the important aspects greatly influence their overall opinions on the product. In particular, given the consumer reviews of a product, we first identify product aspects by a shallow…
Read More

Typicality-Based Collaborative Filtering Recommendation

Cloud Computing, Data mining, Security and Encryption
Typicality-Based Collaborative Filtering Recommendation Collaborative filtering (CF) is an important and popular technology for recommender systems. However, current CF methods suffer from such problems as data sparsity, recommendation inaccuracy, and big-error in predictions. In this paper, we borrow ideas of object typicality from cognitive psychology and propose a novel typicality-based collaborative filtering recommendation method named TyCo. A distinct feature of typicality-based CF is that it finds “neighbors” of users based on user typicality degrees in user groups (instead of the corated items of users, or common users of items, as in traditional CF). To the best of our knowledge, there has been no prior work on investigating CF recommendation by combining object typicality. TyCo outperforms many CF recommendation methods on recommendation accuracy (in terms of MAE) with an improvement of…
Read More

A Location- and Diversity-aware News Feed System for Mobile Users

Android Mobile development, Security and Encryption
A Location- and Diversity-aware News Feed System for Mobile Users A location-aware news feed system enables mobile users to share geo-tagged user-generated messages, e.g., a user can receive nearby messages that are the most relevant to her. In this paper, we present MobiFeed that is a framework designed for scheduling news feeds for mobile users. MobiFeed consists of three key functions, location prediction, relevance measure, and news feed scheduler. The location prediction function is designed to predict a mobile user’s locations based on an existing path prediction algorithm. The relevance measure function is implemented by combining the vector space model with non-spatial and spatial factors to determine the relevance of a message to a user. The news feed scheduler works with the other two functions to generate news feeds for…
Read More

Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search

Security and Encryption, Web | Desktop Application
Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search Existing semantically secure public-key searchable encryption schemes take search time linear with the total number of the ciphertexts. This makes retrieval from large-scale databases prohibitive. To alleviate this problem, this paper proposes Searchable Public-Key Ciphertexts with Hidden Structures (SPCHS) for keyword search as fast as possible without sacrificing semantic security of the encrypted keywords. In SPCHS, all keyword-searchable ciphertexts are structured by hidden relations, and with the search trapdoor corresponding to a keyword, the minimum information of the relations is disclosed to a search algorithm as the guidance to find all matching ciphertexts efficiently. We construct a SPCHS scheme from scratch in which the ciphertexts have a hidden star-like structure. We prove our scheme to be semantically secure in…
Read More

Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud

Cloud Computing, Data mining, Parallel And Distributed System, Security and Encryption, Web | Desktop Application
Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud With data storage and sharing services in the cloud, users can easily modify and share data as a group. To ensure shared data integrity can be verified publicly, users in the group need to compute signatures on all the blocks in shared data. Different blocks in shared data are generally signed by different users due to data modifications performed by different users. For security reasons, once a user is revoked from the group, the blocks which were previously signed by this revoked user must be re-signed by an existing user. The straightforward method, which allows an existing user to download the corresponding part of shared data and re-sign it during user revocation, is inefficient due to the…
Read More

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data

Cloud Computing, Security and Encryption
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data The project defines and solve the problem of multi-keyword ranked search over encrypted cloud data (MRSE) while preserving strict system wise privacy in the cloud computing paradigm. Data owners are motivated to outsource their complex data management systems from local sites to the commercial public cloud for great flexibility and economic savings. But for protecting data privacy, sensitive data have to be encrypted before outsourcing, which obsoletes traditional data utilization based on plaintext keyword search. Thus, enabling an encrypted cloud data search service is of paramount importance. Considering the large number of data users and documents in the cloud, it is necessary to allow multiple keywords in the search request and return documents in the order of their…
Read More

Persuasive Cued Click-Points: Design, implementation, and evaluation of a knowledge-based authentica

Multimedia, Security and Encryption
Persuasive Cued Click-Points: Design, implementation, and evaluation of a knowledge-based authentication Increasingly developed social sharing websites, like Flickr and Youtube, allow users to create, share, annotate and comment Medias. The large-scale usergenerated meta-data not only facilitate users in sharing and organizing multimedia content, but provide useful information to improve media retrieval and management. Personalized search serves as one of such examples where the web search experience is improved by generating the returned list according to the modified user search intents. In this paper, we exploit the social annotations and propose a novel framework simultaneously considering the user and query relevance to learn to personalized image search. The basic premise is to embed the user preference and query-related search intent into user-specific topic spaces. Since the users’ original annotation is too…
Read More

A NOVEL ANTI PHISHING FRAMEWORK BASED ON VISUAL CRYPTOGRAPHY

Parallel And Distributed System, Security and Encryption, Web | Desktop Application
A NOVEL ANTI PHISHING FRAMEWORK BASED ON VISUAL CRYPTOGRAPHY Phishing is an attempt by an individual or a group to thieve personal confidential information such as passwords, credit card information etc from unsuspecting victims for identity theft, financial gain and other fraudulent activities. In this paper we have proposed a new approach named as "A Novel Anti phishing framework based on visual cryptography" to solve the problem of phishing. Here an image based authentication using Visual Cryptography (vc) is used. The use of visual cryptography is explored to preserve the privacy of image captcha by decomposing the original image captcha into two shares that are stored in separate database servers such that the original image captcha can be revealed only when both are simultaneously available; the individual sheet images do…
Read More

A Keyless Approach to Image Encryption

Image Processing, Security and Encryption, Web | Desktop Application
A Keyless Approach to Image Encryption Maintaining the secrecy and confidentiality of images is a vibrant area of research, with two different approaches being followed, the first being encrypting the images through encryption algorithms using keys, the other approach involves dividing the image into random shares to maintain the images secrecy. Unfortunately heavy computation cost and key management limit the employment of the first approach and the poor quality of the recovered image from the random shares limit the applications of the second approach. In this paper we propose a novel approach without the use of encryption keys. The approach employs Sieving, Division and Shuffling to generate random shares such that with minimal computation, the original secret image can be recovered from the random shares without any loss of image…
Read More

Slicing A New Approach to Privacy Preserving Data Publishing.

Data mining, Security and Encryption, Web | Desktop Application
Slicing A New Approach to Privacy Preserving Data Publishing. Several anonymization techniques, such as generalization and bucketization, have been designed for privacy preserving microdata publishing. Recent work has shown that general- ization loses considerable amount of information, especially for high-dimensional data. Bucketization, on the other hand, does not prevent membership disclosure and does not apply for data that do not have a clear separation between quasi- identifying attributes and sensitive attributes.
Read More

Data leakage Detection

Security and Encryption, Web | Desktop Application
Data leakage Detection While doing business, sometimes sensitive data must be handed over to supposedly trusted third parties. For example, a hospital may give patient records to researchers who will devise new treatments. Similarly, a company may have partnerships with other companies that require sharing customer data. Another enterprise may outsource its data processing, so data must be given to various other companies. We call the owner of the data the distributor and the supposedly trusted third parties the agents. Our goal is to detect when the distributor’s sensitive data has been leaked by agents, and if possible to identify the agent that leaked the data. We consider applications where the original sensitive data cannot be perturbed. Perturbation is a very useful technique where the data is modified and made…
Read More