Android Controlled Remote Password Security

Android Controlled Remote Password Security

8051 Microcontroller, Android Mobile development, Security and Encryption
Android Controlled Remote Password Security Our project aims at a system that provides the required authority, the ability to change the password as and when needed. Organizational security is an important factor these days. This is applicable to intellectual as well as physical property security. Our system aims to provides an improved security systems to domestic and organizational industry. Our project has a system that is configured to allow authorized person with a password. A password changing provision is also provided along with it. The password entering feature is provide through remote access. The remote access is provided with the use of an android application that is to be run on any android operated device. The app provides an interactive GUI for this system. The system is operated using an…
Read More
Configurable Password Security System

Configurable Password Security System

8051 Microcontroller, Security and Encryption
Zero Configurable Password Security System The project is a security system which allows only authorized access to users with a password. The system has a feature of changing the password anytime by the authorized user as required. The project comprises of a microcontroller of 8051 family that is interfaced to an EEPROM which stores the password. The project requires a keypad to enter password, and a Motor Driver that is interfaced to microcontroller for locking or unlocking a door or any security system. An alert would be produced if there is any wrong attempt and a door open if the attempt is right. The project can be used for security purposes in home, offices, organizations etc. This proposed system provides a user friendly security system for organizations and homes. This…
Read More
RF Secure Coded Communication System

RF Secure Coded Communication System

8051 Microcontroller, Security and Encryption
RF Secure Coded Communication System Our project enables users to send secret codes by entering messages through computer keyboard and sending the code through RF transmitters. This secret code sent is received through an RF receiver. The rest functionality is performed at receiving end thus maintaining confidentiality of the message. The system is designed to be used for secret code transmissions needed in military, government or other sensitive communications. User may type his message through a computer keyboard. This is then processed by an 8051 microcontroller and delivered to the receiver end wirelessly. This system has a secret code attached to the transmission. The message typed in by user is transmitted to the receiving end through an RF transmitter. At the receiving end the RF receiver is integrated with a…
Read More

Military Access Using Card Scanning With OTP

Security and Encryption, Sensor, Web | Desktop Application
Military Access Using Card Scanning With OTP Military access is the most secure access provision and needs to be kept that way considering national security issues. Usual military authentication and authorization techniques consist of one way authentication techniques with just one form of authentication, namely password or smart card or biometric. Here we propose a two stage authentication/authorization technique for secured military access to authorized personnel. The first stage is a card scanning system, each authorized personnel must have a smart card. On card scanning the system also asks of an additional 4 digit code associated with it, on entering the right code the personnel goes to the next stage of authentication. On the next stage, system generates a one time password and sends to the mobile phone registered to…
Read More

Secure ATM Using Card Scanning Plus OTP

Security and Encryption, Web | Desktop Application
>Secure ATM Using Card Scanning Plus OTP Our project proposes a secured ATM (Any time Money) system using a card scanning system along with Otp password system on sms for improved security. Usual ATM systems do not contain the OTP feature for money withdrawal. If an attacker manages to get hold of ATM card and the pin number he may easily use it to withdraw money fraudently. So our proposed system supports the ATM card scanning system along with an OTP system. Ths user may scan his card and login to the system .But after user is through with this authentication he may view details but is asked to enter OTP as soon as he clicks money withdrawal option. At this stage the system generates and sends a One time…
Read More

Secure Remote Communication Using DES Algorithm

Cloud Computing, Security and Encryption, Web | Desktop Application
Secure Remote Communication Using DES Algorithm The Data Encryption Standard (DES) algorithm is a widely accepted system for data encryption that makes use of a private (secret) key that was judged so hard to break by the U.s. government that it was confined for exportation to different nations. There are more than 71,000,000,000,000,000 (71 quadrillion) encryption keys to be used in this algorithm. For any given message, the key is picked at irregular interval from among this colossal number of keys. Like other private key cryptographic routines, both the sender and the collector must know and utilize a common private key. Many companies, governments, military and other fields make use of DES algorithm for secure data transfer over unsecure networks. We here propose a system for secured data transfer over…
Read More

Image Steganography With 3 Way Encryption

Security and Encryption, Web | Desktop Application
Name Image Steganography With 3 Way Encryption Technology DotNET,MS SQL Category Web Application Description Steganography is the technique of hiding private or sensitive information within something that appears to be nothing be a usual image. Steganography involves hiding Text so it appears that to be a normal image or other file. If a person views that object which has hidden information inside, he or she will have no idea that there is any secret information. What steganography essentially does is exploit human perception, human senses are not trained to look for files that have information inside of them. What this system does is, it lets user to send text as secrete message inside an image file, user uploads the image and enters the text to send secretly, and gives a…
Read More

Image Steganography Using Kmeans & Encryption

Security and Encryption, Web | Desktop Application
Image Steganography Using Kmeans & Encryption Steganography involves hiding of text, image or any sensitive information inside another image, video or audio in such a way that an attacker will not be able to detect its presence. Steganography is, many times, confused with cryptography as both the techniques are used to secure information. The difference lies in the fact that steganography hides the data so that nothing appears out of ordinary while cryptography encrypts the text, making it difficult for an outsider to infer anything from it even if they do attain the encrypted text. Both of them are combined to increase the security against various malicious attacks. Image Steganography uses an image as the cover media to hide the secret message. In this paper, we propose an image steganography…
Read More

A New Hybrid Technique For Data Encryption

Networking, Security and Encryption, Web | Desktop Application
A New Hybrid Technique For Data Encryption Data encryption has been widely applied in many data processing areas. Various encryption algorithms have been developed for processing text documents, images, video, etc. If we are able to collaborate the advantages of the different existing encryption methods, then a new hybrid encryption method can be developed which offers better security and protection. So, in order to accomplish the Hybrid encryption technique, data encryption techniques using Fibonacci series, XOR logic, PN sequence are studied, analyzed and their performance is compared in this paper. The message is divided into three parts and these three different techniques are applied to these parts and the performance is again analyzed. The application of these three different methods to different parts of the same message along with two…
Read More

Secure Data Transfer Over Internet Using Image Steganography

Cloud Computing, Networking, Parallel And Distributed System, Security and Encryption, Web | Desktop Application
Secure Data Transfer Over Internet Using Image Steganography Steganography is the technique of hiding private or sensitive information within something that appears to be nothing be a usual image. Steganography involves hiding Text so it appears that to be a normal image or other file. If a person views that object which has hidden information inside, he or she will have no idea that there is any secrete information. What steganography essentially does is exploit human perception, human senses are not trained to look for files that have information inside of them. What this system does is, it lets user to send text as secrete message inside an image file, user uploads the image and enters the text to send secretly, and gives a key or a pass word to…
Read More

Encryption & Decryption Using Deffie Hellman Algorithm

Multimedia, Security and Encryption, Web | Desktop Application
Encryption & Decryption Using Deffie Hellman Algorithm The spectacular growth of the Internet has spawned an increased awareness of and interest in security issues. Although security has been considered in the design of the basic Internet protocols, many applications have been and are being designed with minimal attention paid to issues of confidentiality, authentication, and privacy. As our daily activities become more and more reliant upon data networks, the importance of an understanding of such security issues will only increase. Many cryptographic algorithms (e.g., DES, AES) require the establishment of shared keying material in advance. Manual distribution of keying material is inefficient and complex. This is where the Diffie-Hellman Key Agreement algorithm is useful. The project is developed using Visual Studio with C# .Net as programming language. There is only…
Read More

Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

Cloud Computing, Networking, Security and Encryption, Web | Desktop Application
Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity and frequent partitions. Disruption-tolerant network (DTN) technologies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by exploiting external storage nodes. Some of the most challenging issues in this scenario are the enforcement of authorization policies and the policies update for secure data retrieval. Ciphertext-policy attribute-based encryption (CP-ABE) is a promising cryptographic solution to the access control issues. However, the problem of applying CP-ABE in decentralized DTNs introduces several security and privacy challenges with regard to the attribute revocation, key escrow, and coordination of attributes issued…
Read More

Product Aspect Ranking and Its Applications

Cloud Computing, Data mining, Security and Encryption, Web | Desktop Application
Product Aspect Ranking and Its Applications Numerous consumer reviews of products are now available on the Internet. Consumer reviews contain rich and valuable knowledge for both firms and users. However, the reviews are often disorganized, leading to difficulties in information navigation and knowledge acquisition. This article proposes a product aspect ranking framework, which automatically identifies the important aspects of products from online consumer reviews, aiming at improving the usability of the numerous reviews. The important product aspects are identified based on two observations: 1) the important aspects are usually commented on by a large number of consumers and 2) consumer opinions on the important aspects greatly influence their overall opinions on the product. In particular, given the consumer reviews of a product, we first identify product aspects by a shallow…
Read More

Typicality-Based Collaborative Filtering Recommendation

Cloud Computing, Data mining, Security and Encryption
Typicality-Based Collaborative Filtering Recommendation Collaborative filtering (CF) is an important and popular technology for recommender systems. However, current CF methods suffer from such problems as data sparsity, recommendation inaccuracy, and big-error in predictions. In this paper, we borrow ideas of object typicality from cognitive psychology and propose a novel typicality-based collaborative filtering recommendation method named TyCo. A distinct feature of typicality-based CF is that it finds “neighbors” of users based on user typicality degrees in user groups (instead of the corated items of users, or common users of items, as in traditional CF). To the best of our knowledge, there has been no prior work on investigating CF recommendation by combining object typicality. TyCo outperforms many CF recommendation methods on recommendation accuracy (in terms of MAE) with an improvement of…
Read More

A Location- and Diversity-aware News Feed System for Mobile Users

Android Mobile development, Security and Encryption
A Location- and Diversity-aware News Feed System for Mobile Users A location-aware news feed system enables mobile users to share geo-tagged user-generated messages, e.g., a user can receive nearby messages that are the most relevant to her. In this paper, we present MobiFeed that is a framework designed for scheduling news feeds for mobile users. MobiFeed consists of three key functions, location prediction, relevance measure, and news feed scheduler. The location prediction function is designed to predict a mobile user’s locations based on an existing path prediction algorithm. The relevance measure function is implemented by combining the vector space model with non-spatial and spatial factors to determine the relevance of a message to a user. The news feed scheduler works with the other two functions to generate news feeds for…
Read More

Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud

Cloud Computing, Data mining, Parallel And Distributed System, Security and Encryption, Web | Desktop Application
Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud With data storage and sharing services in the cloud, users can easily modify and share data as a group. To ensure shared data integrity can be verified publicly, users in the group need to compute signatures on all the blocks in shared data. Different blocks in shared data are generally signed by different users due to data modifications performed by different users. For security reasons, once a user is revoked from the group, the blocks which were previously signed by this revoked user must be re-signed by an existing user. The straightforward method, which allows an existing user to download the corresponding part of shared data and re-sign it during user revocation, is inefficient due to the…
Read More

Persuasive Cued Click-Points: Design, implementation, and evaluation of a knowledge-based authentica

Multimedia, Security and Encryption
Persuasive Cued Click-Points: Design, implementation, and evaluation of a knowledge-based authentication Increasingly developed social sharing websites, like Flickr and Youtube, allow users to create, share, annotate and comment Medias. The large-scale usergenerated meta-data not only facilitate users in sharing and organizing multimedia content, but provide useful information to improve media retrieval and management. Personalized search serves as one of such examples where the web search experience is improved by generating the returned list according to the modified user search intents. In this paper, we exploit the social annotations and propose a novel framework simultaneously considering the user and query relevance to learn to personalized image search. The basic premise is to embed the user preference and query-related search intent into user-specific topic spaces. Since the users’ original annotation is too…
Read More

A Keyless Approach to Image Encryption

Image Processing, Security and Encryption, Web | Desktop Application
A Keyless Approach to Image Encryption Maintaining the secrecy and confidentiality of images is a vibrant area of research, with two different approaches being followed, the first being encrypting the images through encryption algorithms using keys, the other approach involves dividing the image into random shares to maintain the images secrecy. Unfortunately heavy computation cost and key management limit the employment of the first approach and the poor quality of the recovered image from the random shares limit the applications of the second approach. In this paper we propose a novel approach without the use of encryption keys. The approach employs Sieving, Division and Shuffling to generate random shares such that with minimal computation, the original secret image can be recovered from the random shares without any loss of image…
Read More

Slicing A New Approach to Privacy Preserving Data Publishing.

Data mining, Security and Encryption, Web | Desktop Application
Slicing A New Approach to Privacy Preserving Data Publishing. Several anonymization techniques, such as generalization and bucketization, have been designed for privacy preserving microdata publishing. Recent work has shown that general- ization loses considerable amount of information, especially for high-dimensional data. Bucketization, on the other hand, does not prevent membership disclosure and does not apply for data that do not have a clear separation between quasi- identifying attributes and sensitive attributes.
Read More

Data leakage Detection

Security and Encryption, Web | Desktop Application
Data leakage Detection While doing business, sometimes sensitive data must be handed over to supposedly trusted third parties. For example, a hospital may give patient records to researchers who will devise new treatments. Similarly, a company may have partnerships with other companies that require sharing customer data. Another enterprise may outsource its data processing, so data must be given to various other companies. We call the owner of the data the distributor and the supposedly trusted third parties the agents. Our goal is to detect when the distributor’s sensitive data has been leaked by agents, and if possible to identify the agent that leaked the data. We consider applications where the original sensitive data cannot be perturbed. Perturbation is a very useful technique where the data is modified and made…
Read More