Video Surveillance Project

Image Processing, Security and Encryption, Web | Desktop Application
Video Surveillance Project This is an innovative approach to video surveillance software project. We normally find video camera?s in banks and other organization that continuously record and save the recorded video footage for days or months. This utilizes a lot of battery life and storage capacity to store these large video footage. Well this video surveillance software is an enhanced version of organization security that continuously monitors but only records unusual changes in the organization. These unusual changes may include theft detection or fire detection in offices. It may also include rodent detection in bakeries or restaurants after closing. As soon as the system catches any unusual activity it takes steps and informs the user by: 1. Sending an sms to the user about an unusual activity. 2. Sending an…
Read More

Graphical Password By Image Segmentation

Image Processing, Security and Encryption, Web | Desktop Application
Graphical Password By Image Segmentation The project allows user to input an image as its password and only user knows what the image looks like as a whole. On receiving the image the system segments the image into an array of images and stores them accordingly. The next time user logs on to the system the segmented image is received by the system in a jumbled order. Now if user chooses the parts of image in an order so as to make the original image he sent then user is considered authentic. Else the user is not granted access. The system uses image segmentation based on coordinates. The coordinates of the segmented image allow the system to fragment the image and store it in different parts. Actually system segments the…
Read More

Document checker and Corrector Project

Artificial Intelligence & ML, Data mining, Image Processing, Security and Encryption, Web | Desktop Application
Document checker and Corrector Project HECKS YOUR .DOC OR .DOCX FILES IN THIS YOU CAN ATTACH FOLDER OF WORD DOCS AND THEN THE BELOW CONDITIONS CAN BE CHECKED IN THOSE DOC FILES AND ERROR REPORTS CAN BE GENERATED: ? All the pages must be seprate files, i.e 800 pages will be 800 files. ? All formatting should be in inches (?). ? FILE : Page set up : Top-Bottom-Left-Right 0.25?& Gutter: 0.5? Paper size A4, Layout: header/footer 0.7? ? Heading first ? Heading Style 1 ? Arial ? 16 ? Bold ? Heading second ? Heading Style 2 ? Arial ? 14 ? Bold & Italic. ? Heading third ? Heading Style 3 ? Arial ? 13 ? Bold & Italic. Use only in Header & Footer ? Heading position…
Read More

Student Attendance System by Barcode Scan

Artificial Intelligence & ML, Data mining, Image Processing, Security and Encryption, Web | Desktop Application
Student Attendance System by Bar-code Scan In past days student mark their attendance on paper but sometimes there are chances of losing the paper. In that case we cannot calculate the attendance of students. So to overcome these issues we implement the system that will hide all student information (identity card) inside the Bar-Code. The project is a system that takes down students attendance using bar-code. Every student is provided with a card containing a unique bar-code. Each bar-code represents a unique id of students. Students just have to scan their cards using bar-code scanner and the system notes down their attendance as per dates. System then stores all the students attendance records and generates defaulter list. It also generates an overall report in excel sheet for admin. Such kind…
Read More

Face Recognition Attendance System

Artificial Intelligence & ML, Data mining, Image Processing, Security and Encryption, Web | Desktop Application
Face Recognition Attendance System The system is developed for deploying an easy and a secure way of taking down attendance. The software first captures an image of all the authorized persons and stores the information into database. The system then stores the image by mapping it into a face coordinate structure. Next time whenever the registered person enters the premises the system recognizes the person and marks his attendance along with the time. It the person arrives late than his reporting time, the system speaks a warning ?you are xx minutes late! Do not repeat this.? Note: This system has around 40%-60% accuracy in scanning and recognizing faces.
Read More

Detecting Data Leakage

Data mining, Security and Encryption, Web | Desktop Application
Detecting Data Leaks This project addresses various data leakage problems: Consider a data sender who transfers some confidential data to some of his counterparts (third party). Some of this sensitive data gets leaked accidentally or purposely by an attacker and is downloaded on his terminal. The distributor must find the possibilities that the compromised data was from one or more of his counterparts, as opposed to having gathered by other means. So our project allows for data allocation tactics (through the counterparts) that improves the chances of identifying data leakages. These methods do not depend on various alterations of the transferred data like parity. In some of the cases, we can also insert ?realistic but fake? data records into the data stream to further improve our chances of identifying unknown…
Read More

Automatic Answer Checker

Artificial Intelligence & ML, Data mining, Image Processing, Security and Encryption, Sensor, Web | Desktop Application
Automatic Answer Checker An automatic answer checker application that checks and marks written answers similar to a human being. This software application is built to check subjective answers in an online examination and allocate marks to the user after verifying the answer. The system requires you to store the original answer for the system. This facility is provided to the admin. The admin may insert questions and respective subjective answers in the system. These answers are stored as notepad files. When a user takes the test he is provided with questions and area to type his answers. Once the user enters his/her answers the system then compares this answer to original answer written in database and allocates marks accordingly. Both the answers need not be exactly same word to word.…
Read More

Secure Lab Access Using Card Scanner Plus Face Recognition

Image Processing, Security and Encryption, Web | Desktop Application
Secure Lab Access Using Card Scanner Plus Face Recognition Research laboratories funded by private or government organizations are of strategic importance to a country. A lot of sensitive research is carried on in such laboratories. The confidentiality of such premises is of prime importance for the benefit of the society. At such time it becomes necessary to ensure high level authentication and authorization of personnel entering such facilities. A single form of authentication/authorization is not enough for these sensitive organizations. Here we propose a system that combines two different forms of authentication techniques to ensure only authorized persons access the premises. Our system integrates biometrics with secure card to create a dual secure high end security system never implemented before. The system first checks if the persons face is registered…
Read More

Secure File Storage On Cloud Using Hybrid Cryptography

Cloud Computing, Security and Encryption, Web | Desktop Application
Secure File Storage On Cloud Using Hybrid Cryptography The proposed software product is liable to meet the required security needs of data center of cloud. Blowfish used for the encryption of file slices takes minimum time and has maximum throughput for encryption and decryption from other symmetric algorithms. The idea of splitting and merging adds on to meet the principle of data security. The hybrid approach when deployed in cloud environment makes the remote server more secure and thus, helps the cloud providers to fetch more trust of their users. For data security and privacy protection issues, the fundamental challenge of separation of sensitive data and access control is fulfilled. Cryptography technique translates original data into unreadable form. Cryptography technique is divided into symmetric key cryptography and public key cryptography.…
Read More

ATM Detail Security Using Image Steganography

Security and Encryption, Web | Desktop Application
ATM Detail Security Using Image steganography Now you can securely perform your ATM transactions with the help of this system as it provides 3 level of security. This system works as follows. Once the user enters the PIN, the user is prompted to enter the OTP (One Time Password) which is a 4-digit random password sent by the server to the user’s registered mobile number. On cross verification with the data stored in the system database, the user is allowed to make a transaction. The underlying mechanism involves combining the concepts of Cryptography and Steganography. The PIN and OTP are encrypted using AES 256. Then the encrypted data is steganographed with the image selected by the user which acts as the BASE image. The Steganographed image is sent to the…
Read More

Image Steganography Using Kmeans & Encryption

Security and Encryption, Web | Desktop Application
Image Steganography Using Kmeans & Encryption Steganography involves hiding of text, image or any sensitive information inside another image, video or audio in such a way that an attacker will not be able to detect its presence. Steganography is, many times, confused with cryptography as both the techniques are used to secure information. The difference lies in the fact that steganography hides the data so that nothing appears out of ordinary while cryptography encrypts the text, making it difficult for an outsider to infer anything from it even if they do attain the encrypted text. Both of them are combined to increase the security against various malicious attacks. Image Steganography uses an image as the cover media to hide the secret message. In this paper, we propose an image steganography…
Read More

Android Text Encryption Using Various Algorithms

Android Mobile development, Security and Encryption, Web | Desktop Application
Android Text Encryption Using Various Algorithms Users communicate over all social media, but messages are not secured when it passes through network. Intruder can access user’s message easily. We want to secure users communication over all social media. So here we proposed a system where user will enter the plain text and select the algorithm type from AES,DES,MD5,….. and provide the key, a chipper text will be formed that can be sent via any communication application and end user can decrypt the text by selecting the same algorithm type and must enter the same sender secret key. User can use our application and can enter the plain text and must select the algorithm type and must enter the secret key to encrypt the message and receiver can decrypt the message…
Read More

Image Encryption For Secure Internet Transfer

Networking, Parallel And Distributed System, Security and Encryption, Web | Desktop Application
Image Encryption For Secure Internet Transfer Encryption is commonly used for encryption of text as well as images. Various encryption algorithms exist for this purpose. Here we propose to build a secured image encryption algorithm that can be used to encrypt as well as send images remotely to the intended receiver. Our system can link to remote client to our software installed on remote system and connect to it for image transfer. Our system uses RSA algorithm for this purpose. User may submit his image for encryption. Our system now gets the image and converts it into hex format before being encrypted. Then we use RSA algorithm to encrypt the image for sending through the internet. User may now select the intended user from among the list of users having…
Read More

Secure Data Transfer Over Internet Using Image Steganography

Cloud Computing, Networking, Parallel And Distributed System, Security and Encryption, Web | Desktop Application
Secure Data Transfer Over Internet Using Image Steganography Steganography is the technique of hiding private or sensitive information within something that appears to be nothing be a usual image. Steganography involves hiding Text so it appears that to be a normal image or other file. If a person views that object which has hidden information inside, he or she will have no idea that there is any secrete information. What steganography essentially does is exploit human perception, human senses are not trained to look for files that have information inside of them. What this system does is, it lets user to send text as secrete message inside an image file, user uploads the image and enters the text to send secretly, and gives a key or a pass word to…
Read More

Sending a secure message over a network to a remote site

Parallel And Distributed System, Security and Encryption, Web | Desktop Application
Sending a secure message over a network to a remote site We here use a system to securely transfer a message encrypted using Aes algorithm to a remote site so that only proper authentication at remote site can decrypt the message. The system also uses acknowledgements to signal the message integrity and delivery over the network. The system consists of two terminal applications running concurrently over two different PC’s. User may first use the sending tab to send a secure message. On using this function the accepts user string and key to encrypt it. The system then receives this message and encrypts it using AES algorithm. Now the system transfers this message to remote site using over a Tcp/ip internet connection. The receiving system sends out a notification acknowledgement to…
Read More

Secure Electronic Fund Transfer Over Internet Using DES

Networking, Parallel And Distributed System, Security and Encryption, Web | Desktop Application
Secure Electronic Fund Transfer Over Internet Using DES Nowadays people often need to transfer cash from one account to another. In such cases they need to go to bank or search for PC connected to internet to get access to the services offered by internet banking for reliable fund transfer. This system proves to be really beneficial in such cases. As with the help of this system the user just needs to enter the account details. For security, DES algorithm is used along with instant verification and consistency check algorithm. All these are performed for secure electronic fund transfer. Thus a user just needs to visit any EFT center, in order to make the payment. The transfer is done instantly using a single portable card. In this way the user…
Read More

High Security Encryption Using AES & Visual Cryptography

Multimedia, Networking, Security and Encryption, Web | Desktop Application
High Security Encryption Using AES & Visual Cryptography A novel and highly secure encryption methodology using a combination of AES and visual crypto. With the ever increasing human dependency on The Internet for performing various activities such as banking, shopping or transferring money, there equally exists a need for safe and secure transactions. This need a system that automatically translates to the requirement of increased network security and better and fast encryption algorithms. This system addresses the above issue by introducing a novel methodology by utilizing the AES method of encryption and also further enhances the same with the help of visual cryptography. In this method the secret message is divided into two parts after which the message the first half of the message is encrypted using AES and the…
Read More

Data Standardization Using Hidden Markov Model

Security and Encryption, Web | Desktop Application
Data Standardization Using Hidden Markov Model Record linkage refers to the process of joining records that relate to the same entity or event in one or more data collections. In the absence of a shared, unique key, record linkage involves the comparison of ensembles of partially-identifying, non-unique data items between pairs of records. Data items with variable formats, such as names and addresses, need to be transformed and normalized in order to validly carry out these comparisons. Traditionally, deterministic rule-based data processing systems have been used to carry out this pre-processing, which is commonly referred to as “standardization”. This project describes an alternative approach to standardization, using a combination of lexicon-based tokenization and probabilistic Hidden Markov Models (HMMs). The project is developed using Visual Studio with C# .Net as programming…
Read More

Encryption & Decryption Using Deffie Hellman Algorithm

Multimedia, Security and Encryption, Web | Desktop Application
Encryption & Decryption Using Deffie Hellman Algorithm The spectacular growth of the Internet has spawned an increased awareness of and interest in security issues. Although security has been considered in the design of the basic Internet protocols, many applications have been and are being designed with minimal attention paid to issues of confidentiality, authentication, and privacy. As our daily activities become more and more reliant upon data networks, the importance of an understanding of such security issues will only increase. Many cryptographic algorithms (e.g., DES, AES) require the establishment of shared keying material in advance. Manual distribution of keying material is inefficient and complex. This is where the Diffie-Hellman Key Agreement algorithm is useful. The project is developed using Visual Studio with C# .Net as programming language. There is only…
Read More

Secure Electronic Fund Transfer Over Internet Using DES

Security and Encryption, Web | Desktop Application
Secure Electronic Fund Transfer Over Internet Using DES Nowadays people often need to transfer cash from one account to another. In such cases they need to go to bank or search for PC connected to internet to get access to the services offered by internet banking for reliable fund transfer. This system proves to be really beneficial in such cases. As with the help of this system the user just needs to enter the account details. For security, DES algorithm is used along with instant verification and consistency check algorithm. All these are performed for secure electronic fund transfer. Thus, a user just needs to visit any EFT center, in order to make the payment.The transfer is done instantly using a single portable card. In this way the user can…
Read More

Policy-by-Example for Online Social Networks.

Cloud Computing, Data mining, Security and Encryption
Policy-by-Example for Online Social Networks We introduce two approaches for improving privacy policy management in online social networks. First, we introduce a mechanism using proven clustering techniques that assists users in grouping their friends for group based policy management approaches. Second, we introduce a policy management approach that leverages a user's memory and opinion of their friends to set policies for other similar friends. We refer to this new approach as Same-As Policy Management. To demonstrate the e ectiveness of our policy management improvements, we implemented a prototype Facebook application and conducted an extensive user study. Leveraging proven clustering techniques, we demonstrated a 23% reduction in friend grouping time. In addition, we demonstratedconsiderable reductions in policy authoring time using Same As Policy Management over traditional group based policy management approaches. Finally,…
Read More

Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search

Security and Encryption, Web | Desktop Application
Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search Existing semantically secure public-key searchable encryption schemes take search time linear with the total number of the ciphertexts. This makes retrieval from large-scale databases prohibitive. To alleviate this problem, this paper proposes Searchable Public-Key Ciphertexts with Hidden Structures (SPCHS) for keyword search as fast as possible without sacrificing semantic security of the encrypted keywords. In SPCHS, all keyword-searchable ciphertexts are structured by hidden relations, and with the search trapdoor corresponding to a keyword, the minimum information of the relations is disclosed to a search algorithm as the guidance to find all matching ciphertexts efficiently. We construct a SPCHS scheme from scratch in which the ciphertexts have a hidden star-like structure. We prove our scheme to be semantically secure in…
Read More

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data

Cloud Computing, Security and Encryption
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data The project defines and solve the problem of multi-keyword ranked search over encrypted cloud data (MRSE) while preserving strict system wise privacy in the cloud computing paradigm. Data owners are motivated to outsource their complex data management systems from local sites to the commercial public cloud for great flexibility and economic savings. But for protecting data privacy, sensitive data have to be encrypted before outsourcing, which obsoletes traditional data utilization based on plaintext keyword search. Thus, enabling an encrypted cloud data search service is of paramount importance. Considering the large number of data users and documents in the cloud, it is necessary to allow multiple keywords in the search request and return documents in the order of their…
Read More

A NOVEL ANTI PHISHING FRAMEWORK BASED ON VISUAL CRYPTOGRAPHY

Parallel And Distributed System, Security and Encryption, Web | Desktop Application
A NOVEL ANTI PHISHING FRAMEWORK BASED ON VISUAL CRYPTOGRAPHY Phishing is an attempt by an individual or a group to thieve personal confidential information such as passwords, credit card information etc from unsuspecting victims for identity theft, financial gain and other fraudulent activities. In this paper we have proposed a new approach named as "A Novel Anti phishing framework based on visual cryptography" to solve the problem of phishing. Here an image based authentication using Visual Cryptography (vc) is used. The use of visual cryptography is explored to preserve the privacy of image captcha by decomposing the original image captcha into two shares that are stored in separate database servers such that the original image captcha can be revealed only when both are simultaneously available; the individual sheet images do…
Read More