Graphical Password By Image Segmentation

Image Processing, Parallel And Distributed System, Security & Encryption, Web Application
Name Graphical Password By Image Segmentation Technology DotNET,MS SQL Category Web Application Description The project allows user to input an image as its password and only user knows what the image looks like as a whole. On receiving the image the system segments the image into an array of images and stores them accordingly. The next time user logs on to the system the segmented image is received by the system in a jumbled order. Now if user chooses the parts of image in an order so as to make the original image he sent then user is considered authentic. Else the user is not granted access. The system uses image segmentation based on coordinates. The coordinates of the segmented image allow the system to fragment the image and store…
Read More

Secure Remote Communication Using DES Algorithm

Networking, Security & Encryption, Web Application
Name Secure Remote Communication Using DES Algorithm Technology DotNET,MS SQL Category Web Application Description The Data Encryption Standard (DES) algorithm is a widely accepted system for data encryption that makes use of a private (secret) key that was judged so hard to break by the U.s. government that it was confined for exportation to different nations. There are more than 71,000,000,000,000,000 (71 quadrillion) encryption keys to be used in this algorithm. For any given message, the key is picked at irregular interval from among this colossal number of keys. Like other private key cryptographic routines, both the sender and the collector must know and utilize a common private key. Many companies, governments, military and other fields make use of DES algorithm for secure data transfer over unsecure networks. We here…
Read More

Monitoring Suspicious Discussions On Online Forums Using Data Mining

Data mining, Networking, Security & Encryption, Web Application
Name Monitoring Suspicious Discussions On Online Forums Using Data Mining Technology DotNET,MS SQL Category Web Application Description People now-a-days are very fond of using internet as a discussion medium. As internet technology had been increasing more and more, this technology led to many legal and illegal activities. It is found that much first-hand news has been discussed in Internet forums well before they are reported in traditional mass media. This communication channel provides an effective channel for illegal activities such as dissemination of copyrighted movies, threatening messages and online gambling etc. The law enforcement agencies are looking for solutions to monitor these discussion forums for possible criminal activities and download suspected postings as evidence for investigation. We propose a system which will tackle this problem effectively. In this project we…
Read More

Image Steganography With 3 Way Encryption

Cloud Computing, Parallel And Distributed System, Security & Encryption, Web Application
Name Image Steganography With 3 Way Encryption Technology DotNET,MS SQL Category Web Application Description Steganography is the technique of hiding private or sensitive information within something that appears to be nothing be a usual image. Steganography involves hiding Text so it appears that to be a normal image or other file. If a person views that object which has hidden information inside, he or she will have no idea that there is any secret information. What steganography essentially does is exploit human perception, human senses are not trained to look for files that have information inside of them. What this system does is, it lets user to send text as secrete message inside an image file, user uploads the image and enters the text to send secretly, and gives a…
Read More

Graphical Password To Avoid Shoulder Surfing

Multimedia, Security & Encryption, Web Application
Name Graphical Password To Avoid Shoulder Surfing Technology DotNET,MS SQL Category Web Application Description Since conventional password schemes are vulnerable to shoulder surfing, many shoulder surfing resistant graphical password schemes have been proposed. However, as most users are more familiar with textual passwords than pure graphical passwords, text-based graphical password schemes have been proposed. Unfortunately, none of existing text-based shoulder surfing resistant graphical password schemes is both secure and efficient enough. In this paper, we propose an improved text-based shoulder surfing resistant graphical password scheme by using colours. In the proposed scheme, the user can easily and efficiently login system. Next, we analyze the security and usability of the proposed scheme, and show the resistance of the proposed scheme to shoulder surfing and accidental login. The shoulder surfing attack in…
Read More

Implementing Triple DES With OTP

Parallel And Distributed System, Security & Encryption, Web Application
Name Implementing Triple DES With OTP Technology DotNET,MS SQL Category Web Application Description Triple DES is advantageous because it has a significantly sized key length, which is longer than most key lengths affiliated with other encryption modes. It derives from single DES but the technique is used in triplicate and involves three sub keys and key padding when necessary, such as instances where the keys must be increased to 64 bits in length. Known for its compatibility and flexibility, software can easily be converted for Triple DES inclusion. Triple DES encrypts input data three times. The three keys are referred to as k1, k2 and k3. Thus due to the use of 3 key ,triple DES is more secure and is sometimes preferred over the normal DES. The system combines…
Read More

Secure File Storage On Cloud Using Hybrid Cryptography

Cloud Computing, Networking, Parallel And Distributed System, Security & Encryption, Web Application
Name Secure File Storage On Cloud Using Hybrid Cryptography Technology DotNET,MS SQL Category Web Application Description The proposed software product is liable to meet the required security needs of data center of cloud. Blowfish used for the encryption of file slices takes minimum time and has maximum throughput for encryption and decryption from other symmetric algorithms. The idea of splitting and merging adds on to meet the principle of data security. The hybrid approach when deployed in cloud environment makes the remote server more secure and thus, helps the cloud providers to fetch more trust of their users. For data security and privacy protection issues, the fundamental challenge of separation of sensitive data and access control is fulfilled. Cryptography technique translates original data into unreadable form. Cryptography technique is divided…
Read More

Card Payment Security Using RSA

Cloud Computing, Parallel And Distributed System, Security & Encryption, Web Application
Name Card Payment Security Using RSA Technology DotNET,MS SQL Category Web Application Description Due to increasing e-commerce activity nowadays, there is a need for some encryption technique to ensure security and a way to ensure that the user’s data are securely stored in the database. Thus the system introduces RSA for this purpose. The RSA algorithm is a kind of asymmetric encryption algorithm which appeared in 1978. The algorithm is public key encryption algorithm which is a widely accepted and implemented by public. The use of RSA in this the system makes the process more secure. Now the bank transactions can be done securely without worrying about attacker getting access to the database as the data will be in encrypted form. IEEE Paper Yes IEEE Paper Year 2015
Read More

Preventing Phishing Attack On Voting System Using Visual Cryptography

Cloud Computing, Multimedia, Parallel And Distributed System, Security & Encryption, Web Application
Name Preventing Phishing Attack On Voting System Using Visual Cryptography Technology DotNET,MS SQL Category Web Application Description Voting system Using Visual Cryptography (VC) aims at providing a facility to cast vote for critical and confidential internal corporate decisions. It has the flexibility to allow casting of vote from any remote place. The election is held in full confidentiality by applying appropriate security measures to allow the voter to vote for any participating candidate only if he logs into the system by entering the correct password which is generated by merging the two shares using VC scheme. Administrator sends share 1 to voter e-mail id before election and share 2 will be available in the voting system for his login during election. Voter will get the secret password to cast his…
Read More

Detecting Phishing Websites Using Machine Learning

Cloud Computing, Data mining, Parallel And Distributed System, Security & Encryption, Web Application
Name Detecting Phishing Websites Using Machine Learning Technology DotNET,MS SQL Category Web Application Description There are number of users who purchase products online and make payment through various websites.There are multiple websites who ask user to provide sensitive data such as username, password or credit card details etc. often for malicious reasons. This type of websites is known as phishing website. In order to detect and predict phishing website, we proposed an intelligent, flexible and effective system that is based on using classification Data mining algorithm. We implemented classification algorithm and techniques to extract the phishing data sets criteria to classify their legitimacy. The phishing website can be detected based on some important characteristics like URL and Domain Identity, and security and encryption criteria in the final phishing detection rate.…
Read More

E Authentication System Using QR Code & OTP

Cloud Computing, Data mining, Networking, Parallel And Distributed System, Security & Encryption, Web Application
Name E Authentication System Using QR Code & OTP Technology DotNET,MS SQL Category Web Application Description In the proposed scheme, the user can easily and efficiently login into the system. We analyze the security and usability of the proposed scheme, and show the resistance of the proposed scheme to hacking of login credentials, shoulder surfing and accidental login. The shoulder surfing attack can be performed by the adversary to obtain the user’s password by watching over the user’s shoulder as he enters his password. Since, we have come up with a secure system schemes with different degrees of resistance to shoulder surfing have been proposed. In order to use this authentication system, user need to first register himself into this system by filing up the basic registration details. After a…
Read More

Image Encryption For Secure Internet Transfer

Networking, Parallel And Distributed System, Security & Encryption, Web Application
Name Image Encryption For Secure Internet Transfer Technology MsSql, Dot NET Category Web Application Description Encryption is commonly used for encryption of text as well as images. Various encryption algorithms exist for this purpose. Here we propose to build a secured image encryption algorithm that can be used to encrypt as well as send images remotely to the intended receiver. Our system can link to remote client to our software installed on remote system and connect to it for image transfer. Our system uses RSA algorithm for this purpose. User may submit his image for encryption. Our system now gets the image and converts it into hex format before being encrypted. Then we use RSA algorithm to encrypt the image for sending through the internet. User may now select the…
Read More

Secure Data Transfer Over Internet Using Image Steganography

Cloud Computing, Networking, Parallel And Distributed System, Security & Encryption, Web Application
Name Secure Data Transfer Over Internet Using Image Steganography Technology MsSql, Dot NET Category Web Application Description Steganography is the technique of hiding private or sensitive information within something that appears to be nothing be a usual image. Steganography involves hiding Text so it appears that to be a normal image or other file. If a person views that object which has hidden information inside, he or she will have no idea that there is any secrete information. What steganography essentially does is exploit human perception, human senses are not trained to look for files that have information inside of them. What this system does is, it lets user to send text as secrete message inside an image file, user uploads the image and enters the text to send secretly,…
Read More

Sending a secure message over a network to a remote site

Parallel And Distributed System, Security & Encryption, Web Application
Name Sending a secure message over a network to a remote site Technology MsSql, Dot NET Category Web Application Description We here use a system to securely transfer a message encrypted using Aes algorithm to a remote site so that only proper authentication at remote site can decrypt the message. The system also uses acknowledgements to signal the message integrity and delivery over the network. The system consists of two terminal applications running concurrently over two different PC’s. User may first use the sending tab to send a secure message. On using this function the accepts user string and key to encrypt it. The system then receives this message and encrypts it using AES algorithm. Now the system transfers this message to remote site using over a Tcp/ip internet connection.…
Read More

Secure Electronic Fund Transfer Over Internet Using DES

Networking, Parallel And Distributed System, Security & Encryption, Web Application
Name Secure Electronic Fund Transfer Over Internet Using DES Technology MsSql, Dot NET Category Web Application Description Nowadays people often need to transfer cash from one account to another. In such cases they need to go to bank or search for PC connected to internet to get access to the services offered by internet banking for reliable fund transfer. This system proves to be really beneficial in such cases. As with the help of this system the user just needs to enter the account details. For security, DES algorithm is used along with instant verification and consistency check algorithm. All these are performed for secure electronic fund transfer. Thus a user just needs to visit any EFT center, in order to make the payment. The transfer is done instantly using…
Read More

High Security Encryption Using AES & Visual Cryptography

Multimedia, Networking, Security & Encryption, Web Application
Name High Security Encryption Using AES & Visual Cryptography Technology MsSql, Dot NET Category Web Application Description A novel and highly secure encryption methodology using a combination of AES and visual crypto. With the ever increasing human dependency on The Internet for performing various activities such as banking, shopping or transferring money, there equally exists a need for safe and secure transactions. This need a system that automatically translates to the requirement of increased network security and better and fast encryption algorithms. This system addresses the above issue by introducing a novel methodology by utilizing the AES method of encryption and also further enhances the same with the help of visual cryptography. In this method the secret message is divided into two parts after which the message the first half…
Read More

Data Standardization Using Hidden Markov Model

Security & Encryption, Web Application
Name Data Standardization Using Hidden Markov Model Technology MsSql, Dot NET Category Web Application Description Record linkage refers to the process of joining records that relate to the same entity or event in one or more data collections. In the absence of a shared, unique key, record linkage involves the comparison of ensembles of partially-identifying, non-unique data items between pairs of records. Data items with variable formats, such as names and addresses, need to be transformed and normalized in order to validly carry out these comparisons. Traditionally, deterministic rule-based data processing systems have been used to carry out this pre-processing, which is commonly referred to as “standardization”. This project describes an alternative approach to standardization, using a combination of lexicon-based tokenization and probabilistic Hidden Markov Models (HMMs). The project is…
Read More

Secure Electronic Fund Transfer Over Internet Using DES

Security & Encryption, Web Application
Name Secure Electronic Fund Transfer Over Internet Using DES Technology PHP,MySql Category Web Application Description Nowadays people often need to transfer cash from one account to another. In such cases they need to go to bank or search for PC connected to internet to get access to the services offered by internet banking for reliable fund transfer. This system proves to be really beneficial in such cases. As with the help of this system the user just needs to enter the account details. For security, DES algorithm is used along with instant verification and consistency check algorithm. All these are performed for secure electronic fund transfer. Thus, a user just needs to visit any EFT center, in order to make the payment.The transfer is done instantly using a single portable…
Read More

Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search

Security & Encryption
Name Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search Technology Dot net, MS SQL Category Security Description Existing semantically secure public-key searchable encryption schemes take search time linear with the total number of the ciphertexts. This makes retrieval from large-scale databases prohibitive. To alleviate this problem, this paper proposes Searchable Public-Key Ciphertexts with Hidden Structures (SPCHS) for keyword search as fast as possible without sacrificing semantic security of the encrypted keywords. In SPCHS, all keyword-searchable ciphertexts are structured by hidden relations, and with the search trapdoor corresponding to a keyword, the minimum information of the relations is disclosed to a search algorithm as the guidance to find all matching ciphertexts efficiently. We construct a SPCHS scheme from scratch in which the ciphertexts have a hidden star-like structure.…
Read More