Sunteți pe pagina 1din 4

1.

Image Authentication Based On Watermarking Approach

Here we come up with a system that can embed the information or file into image. We
implemented this system in JAVA. We implemented watermarking techniques to hide
information in digital media. System will hide whole file information into image. Image
watermarking can be used to embed the file into image and can efficiently extract back the
information. We will be working with files in JAVA such as reading or writing file. User will
upload the image and will feed the information into system that will be encrypted within the
uploaded image. User’s most information will remain secured. System will convert the file
text to 16 bit numbers for proper calculation. System will encrypt the messages through
encrypting loop. System will write the encrypted data as pixels in image. For decryption,
system will read the encrypted image and will further read non encrypted image. System will
convert image values into 16 bit values. Finally system will apply decrypting loop to decrypt
information from image. The proposed system is implemented in JAVA. System will output
the result in text file

2. Android Based Encrypted SMS System

This is an advanced Encryption and decryption System targeting the SMS for Android Users
both go and fro. The User can send an Encrypted message while he can decrypt an encrypted
message. The System makes use of the SMS that you see in the inbox, but this system filters
out the one which are encrypted and shows it in their Personal Inbox in the Application. The
Shared private Key is already defined in the application and one has not to insert anything but
the user id which is by default encrypted in the message. So whenever the user is sending a
message he should know the receiver’s id as the id is also appended to the message so that
while the receiver logins to the system the message is already decrypted if he is the desired
recipient. The Id is Auto generated and cannot be changed but for the users ease the system
allows the user to save the recipient’s id in a separate column as Favorites saving the his Id,
Name and Mobile No. The Login is necessary here as a single user can have multiple
accounts with different ids so that he can maintain each account for different purposes and
not clubbing them. This System makes use of AES Encryption Algorithm to encrypt and
decrypt the messages. This App uses Android Studio as its front end and SQLite as back end.
3. ATM Detail Security Using Image Steganography

Now you can securely perform your ATM transactions with the help of this system as it
provides 3 level of security. This system works as follows. Once the user enters the PIN, the
user is prompted to enter the OTP (One Time Password) which is a 4-digit random password
sent by the server to the user’s registered mobile number. On cross verification with the data
stored in the system database, the user is allowed to make a transaction. The underlying
mechanism involves combining the concepts of Cryptography and Steganography. The PIN
and OTP are encrypted using AES 256. Then the encrypted data is steganographed with the
image selected by the user which acts as the BASE image. The Steganographed image is sent
to the server, where it is de-steganographed and verified with the data available in the system
database.

4. Detecting Data Leaks via Sql Injection Prevention on an E-


Commerce

The objective of this project is to prevent SQL injection while firing queries to database and
to make the database secured. This system is online so no need of implementation. It can be
accessed through internet from anywhere. The system uses SQL Injection mechanism
prevention to keep the data safe and secure from sql injection attacks.
The highlighted part here is encryption of card data using AES (Advanced Encryption
Standard) technique. The Online Shop secures the card payment and won’t let the card data to
get hacked. While user doing a card payment, all the card data is encrypted and then stored
into database. System also keeps user details in an encryption form using AES encryption.
The system is built of handling SQL Injection capabilities which doubles the security of
database and prevents from injection hacking codes into the database. Here, the project files
and a database file will be stored into the Azure cloud which will form a connection between
application and cloud server via internet.

5. Secure Data Transfer Over Internet Using Image Steganography

Steganography is the technique of hiding private or sensitive information within something


that appears to be nothing be a usual image. Steganography involves hiding Text so it appears
that to be a normal image or other file. If a person views that object which has hidden
information inside, he or she will have no idea that there is any secrete information. What
steganography essentially does is exploit human perception, human senses are not trained to
look for files that have information inside of them. What this system does is, it lets user to
send text as secrete message inside an image file, user uploads the image and enters the text
to send secretly, and gives a key or a pass word to lock the text, what this key does is it
encrypts the text, so that even if it is hacked by hacker he will not be able to read the text.
You will need the key to decrypt the hidden text. User then sends the image and key to the
receiver and receiver first opens the image, and then he enters the key or password for
decryption of text, he then press decrypt key to get secret text of the sender. By using this
method you can double ensure that your secret message is sent secretly without outside
interference of hackers or crackers. If sender sends this image in public others will not know
what is it, and it will be received by receiver.

6. Smart Android Graphical Password Strategy

Graphical Password application allows the user to set a pattern password for using the other
applications. The pattern are some set of fruits which randomly changes its position every
time you try to login. The user has to provide his details for registration and then has to draw
a pattern as a password by drawing it twice. The user has to select an application while
registration itself and can have multiple accounts for every single application. The pattern is a
4X4 Grid consisting of multiple fruits images, the user has to drag or draw at least over 4
fruits for the application to consider his pattern lock. The Application auto generates a
Unique Id for every User who wants to register. After the user has successfully registered he
is redirected to the Login page where he has to provide his Id and Pattern Password from
which the selected application by the user during the registration opens up.

7. Secure File Storage On Cloud Using Hybrid Cryptography

The proposed software product is liable to meet the required security needs of data center of
cloud. Blowfish used for the encryption of file slices takes minimum time and has maximum
throughput for encryption and decryption from other symmetric algorithms. The idea of
splitting and merging adds on to meet the principle of data security. The hybrid approach
when deployed in cloud environment makes the remote server more secure and thus, helps
the cloud providers to fetch more trust of their users. For data security and privacy protection
issues, the fundamental challenge of separation of sensitive data and access control is
fulfilled. Cryptography technique translates original data into unreadable form. Cryptography
technique is divided into symmetric key cryptography and public key cryptography. This
technique uses keys for translate data into unreadable form. So only authorized person can
access data from cloud server. Cipher text data is visible for all people.

8. High Security Encryption Using AES & Visual Cryptography

A novel and highly secure encryption methodology using a combination of AES and visual
crypto. With the ever increasing human dependency on The Internet for performing various
activities such as banking, shopping or transferring money, there equally exists a need for
safe and secure transactions. This need a system that automatically translates to the
requirement of increased network security and better and fast encryption algorithms. This
system addresses the above issue by introducing a novel methodology by utilizing the AES
method of encryption and also further enhances the same with the help of visual
cryptography. In this method the secret message is divided into two parts after which the
message the first half of the message is encrypted using AES and the second share of the
message is embedded in the image using LSB.

S-ar putea să vă placă și