3D PASSWORD FOR MORE SECURE AUTHENTICATION full report
hey can any one send me a ppt or documentation on following topics.:-

Blue Ray
Tablet PC
Smart Card Standards
Molecular Keypad Lock
VOIP Over Wireless LAN
GIMP
Wimax
HONE POTS
SPINTRONICS
Cyber Crime and Security
DRUG DISCOVERY
BAR CODES
Acid rains
E-wallet
Ethical Hacking
NETWORK SECURITY
Plasma Displays
Micro Mouse
CASP
Virtual Keyboards
Stealth Virus
SIMPUTERS
RED TACTON
Samba Fileserver(38
Sand Box Technology
Robocode
SALT (Speech Application Language Tags
Reply
please send me full report
Reply
hi
report on 3D PASSWORD FOR MORE SECURE AUTHENTICATION is posted in
http://studentbank.in/report-3d-password...ull-report
http://studentbank.in/report-3d-password...ort?page=3
http://studentbank.in/report-3d-password--14576
Reply
ABSTRACT


The main scope of this paper is to detect the lost mobiles. Each and every day thousands of mobiles get misplaced or lost, though effective way for the blocking of the lost mobile to prevent unauthorized person from making and receiving the calls has been done by the manufacturers of the mobile with the help of International Mobile Equipment Identifier (IMEI) has been done but however there has been no development or very little progress for the detection of the misplaced mobile phone.

For the detection of lost mobile SNIFFER plays a vital role .The sniffer device has to be designed precisely and size should be reduced for easy mobility for the purpose of detection .The device can be called as a mobile Base station that includes Sniffer Base station, Unidirectional antenna , Tracking software. The sniffer is a small base station that includes transceiver section.It should operate at a frequency which is much different from the frequency of the current cell in which the operation of detection is being carried out. The directional antenna is an important device that is to be designed and used as it plays a major role.

There are certain boundary conditions that have to be qualified for the identification of lost mobile like the power of the mobile should be good enough, the mobile phone should not be in the shadow region but however this method using modern technologies and devices.
Our paper seems to be a bit costlier for initial setup but the cost is gradually reduced when effectively and efficiently utilized for the purpose of detection.

















INTRODUCTION



One of the most interesting things about cell phone is that it is really a radio an extremely sophisticated radio, which uses some band of frequency that has the basic working similar to the ordinary cordless phone. The mobile cellular communication has been appreciated since its birth in the early 70’s and the advancement in the field of VLSI has helped in designing less power, smaller size but efficient transceiver for the purpose of communication.


But however the technology has not yet answered the loss or misplacement of the lost mobile phone which is significantly increasing. In this paper we discuss the problem and the probable solution that could be done. The IMEI number is a unique number that is embedded in the mobile phone the main purpose of which is the blocking of calls that is made by unauthorized person once the mobile is reported as stolen but here we use it effectively for the purpose of detection.



2. ABOUT IMEI :

The GSM MoU’s IMEI (International Mobile Equipment Identity) numbering system is a 15 digit unique code that is used to identify the GSM/DCS/PCS phone. When a phone is switched on, this unique IMEI number is transmitted and checked against a data base of black listed or grey listed phones in the network’s EIR (Equipment ID Register). This EIR determines whether the phone can log on to the network to make and receive calls. To know the IMEI number the *#06# has to be pressed, the number will be displayed in the LCD screen; it is unique to a mobile phone. If the EIR and IMEI number match, the networks can do a number of things.


For example grey list or blacklist a phone:
1. Grey listing will allow the phone to be used, but it can be tracked to see who has it (via the SIM information).
2. Black listing the phone from being used on any network where there is an EIR match.



IMAGE AUTHENTICATION TECHNIQUES
1. INTRODUCTION

This paper explores the various techniques used to authenticate the visual data recorded by the automatic video surveillance system. Automatic video surveillance systems are used for continuous and effective monitoring and reliable control of remote and dangerous sites. Some practical issues must be taken in to account, in order to take full advantage of the potentiality of VS system. The validity of visual data acquired, processed and possibly stored by the VS system, as a proof in front of a court of law is one of such issues. But visual data can be modified using sophisticated processing tools without leaving any visible trace of the modification. So digital or image data have no value as legal proof, since doubt would always exist that they had been intentionally tampered with to incriminate or exculpate the defendant. Besides, the video data can be created artificially by computerized techniques such as morphing. Therefore the true origin of the data must be indicated to use them as legal proof. By data authentication we mean here a procedure capable of ensuring that data have not been tampered with and of indicating their true origin.

2. AUTOMATIC VISUAL SURVEILLANCE SYSTEM

Automatic Visual Surveillance system is a self monitoring system which consists of a video camera unit, central unit and transmission networks.(figure)

A pool of digital cameras is in charge of frame the scene of interest and sent corresponding video sequence to central unit. The central unit is in charge of analyzing the sequence and generating an alarm whenever a suspicious situation is detected. Central unit also transmits the video sequences to an intervention centre such as security service provider, the police department or a security guard unit. Somewhere in the system the video sequence or some part of it may be stored and when needed the stored sequence can be used as a proof in front of court of law. If the stored digital video sequences have to be legally credible, some means must be envisaged to detect content tampering and reliably trace back to the data origin

3. AUTHENTICATION TECHNIQUES

Authentication techniques are performed on visual data to indicate that the data is not a forgery; they should not damage visual quality of the video data. At the same time, these techniques must indicate the malicious modifications include removal or insertion of certain frames, change of faces of individual, time and background etc. Only a properly authenticated video data has got the value as legal proof. There are two major techniques for authenticating video data. They are as follows

1. Cryptographic Data Authentication

It is a straight forward way to provide video authentication, namely through the joint use of asymmetric key encryption and the digital Hash function.

Cameras calculate a digital summary (digest) of the video by means of hash function. Then they encrypt the digest with their private key, thus obtaining a signed digest which is transmitted to the central unit together with acquired sequences. This digest is used to prove data integrity or to trace back to their origin. Signed digest can only read by using public key of the camera.

2. Watermarking- based authentication

Watermarking data authentication is the modern approach to authenticate visual data by imperceptibly embedding a digital watermark signal on the data.

Digital watermarking is the art and science of embedding copyright information in the original files. The information embedded is called ‘watermarks ‘. Digital watermarks are difficult to remove without noticeably degrading the content and are a covert means in situation where copyright fails to provide robustness.
4. CRYPTOGRAPHY

Mounting concern over the new threats to privacy and security has lead to wide spread adoption of cryptography. Cryptography is the science of transforming documents. It has mainly two functions

• Encryption
• Decryption

The purpose of encryption is to render a document unreadable by all except those who authorize to read it. Cryptographers refer to the content of the original document as plain text. Plain text is converted in to cipher form using an algorithm and a variable or key. The key is a randomly selected string of numbers.

Only after decoding the cipher text using the key the content of the document is revealed to the common people. Encryption schemes are classified in to

1. Symmetric encryption

In which the same key is used to both encode and decode the document.

2. Public key or asymmetric encryption

It requires a pair of keys: one for encrypting the plain text and the other for decrypting the cipher text. A file encrypted with one key of a pair can be decrypted with other key of the same pair.

5. CRYPTOGRAPHIC DATA AUTHENTICATION

To authenticate visual data each video camera is assigned a different public or private key pair, with private key hardwired within the cameras. A document encrypted with the private key of any particular camera can be decrypted with its own public key. This property is used to provide center authentication that is to trace back to the true origin of the data.

Before sending the video sequence to the central unit, cameras calculate a digital summary or digest of the video by means of a proper hash function. The digest is then encrypted with their private key. Encryption is done by considering the digitized value of the brightness of each pixel. Digital signal is a sequence of zeros and ones and it is encrypted with the private key using a proper algorithm. The signed digest thus obtained is then transmitted to the central unit together with the acquired visual sequence.

Later the signal digest is used to prove data integrity or to trace back to their origin. The signed digest is read using the public key of the camera which produce the video and check if it corresponds to the digest derived from the decrypted video content using the same hash function.

Any manipulation of the data will change the calculated image digest derived from the decrypted data. Any discrepancy between the decrypted digest and calculated image digest indicate that the data has been tampered, with identical digest indicates that the data is genuine.

Value of the visual data can be added by tying each frame to the particular label of the instant the frame has been produced yet. This can be achieved by printing date and time of creation of each frame. Any modification of either the date or time could be easily revealed since it would change the locally calculated image digest.

5.1 DRAWBACKS OF CRYPTOGRAPHIC AUTHENTICATION

Even though cryptographic data authentication is highly resistant to content tampering, it suffers from few drawbacks. They are as follows:

1. Knowledge of private key

If the manipulator knows the private key of the camera, he can change the digest to involve the modifications he had made on the actual sequence. But the possibility of such a thing is very small because the private key is hardwired within the camera.


2. Impossible to distinguish between malicious and innocuous modification

It is difficult to distinguish between malicious and innocuous manipulations if cryptography is used. Innocuous modifications include compression of the video sequences. These modifications are usually performed by the central unit whereas digest is calculated on the basis of the uncompressed data by the camera. So on compression the correspondence between the digest and data would be lost.

3. High requirements of video camera

To avoid the above discussed problem, the video camera should perform the compression of the video sequences prior to digest calculation. This requires the video camera to have high computation as storage requirements.

4. Delay in transmission

Digest calculations and encryption introduces a delay in transmission of video documents. This is harmful in system where the timely generation of alarm is critical.

5. Protecting privacy is difficult

A part of the program cannot be removed for privacy reasons since it will alter the calculated digest.

6. WATERMARKING

A digital watermark is a signal that is imperceptibly embedded within digital data. This signal can be detected or extracted by means of computations to make some assertions about the host data.

Digital watermark is a signal which added to a document to authenticate it and to prove the ownership. A commonly encountered digital watermark is the logo most television channels display on the top of the television screen. Not only does it advertise the channel but also provides the legal benefit of having a source signature persist during video recording. Watermark task consists of two main steps

1. Watermark casting:-in which the signal represented by the watermark is transmitted over the channel, that is in watermark casting an encoder function Є takes a host image ‘f’ and a watermark ‘w’ and generate a new image
Fw= Є (f, w)

2. Watermark detection:-in which the signal is received and extracted from possibly corrupted image.

IMAGE AUTHENTICATION TECHNIQUES
1. INTRODUCTION

This paper explores the various techniques used to authenticate the visual data recorded by the automatic video surveillance system. Automatic video surveillance systems are used for continuous and effective monitoring and reliable control of remote and dangerous sites. Some practical issues must be taken in to account, in order to take full advantage of the potentiality of VS system. The validity of visual data acquired, processed and possibly stored by the VS system, as a proof in front of a court of law is one of such issues. But visual data can be modified using sophisticated processing tools without leaving any visible trace of the modification. So digital or image data have no value as legal proof, since doubt would always exist that they had been intentionally tampered with to incriminate or exculpate the defendant. Besides, the video data can be created artificially by computerized techniques such as morphing. Therefore the true origin of the data must be indicated to use them as legal proof. By data authentication we mean here a procedure capable of ensuring that data have not been tampered with and of indicating their true origin.

2. AUTOMATIC VISUAL SURVEILLANCE SYSTEM

Automatic Visual Surveillance system is a self monitoring system which consists of a video camera unit, central unit and transmission networks.(figure)

A pool of digital cameras is in charge of frame the scene of interest and sent corresponding video sequence to central unit. The central unit is in charge of analyzing the sequence and generating an alarm whenever a suspicious situation is detected. Central unit also transmits the video sequences to an intervention centre such as security service provider, the police department or a security guard unit. Somewhere in the system the video sequence or some part of it may be stored and when needed the stored sequence can be used as a proof in front of court of law. If the stored digital video sequences have to be legally credible, some means must be envisaged to detect content tampering and reliably trace back to the data origin

3. AUTHENTICATION TECHNIQUES

Authentication techniques are performed on visual data to indicate that the data is not a forgery; they should not damage visual quality of the video data. At the same time, these techniques must indicate the malicious modifications include removal or insertion of certain frames, change of faces of individual, time and background etc. Only a properly authenticated video data has got the value as legal proof. There are two major techniques for authenticating video data. They are as follows

1. Cryptographic Data Authentication

It is a straight forward way to provide video authentication, namely through the joint use of asymmetric key encryption and the digital Hash function.

Cameras calculate a digital summary (digest) of the video by means of hash function. Then they encrypt the digest with their private key, thus obtaining a signed digest which is transmitted to the central unit together with acquired sequences. This digest is used to prove data integrity or to trace back to their origin. Signed digest can only read by using public key of the camera.

2. Watermarking- based authentication

Watermarking data authentication is the modern approach to authenticate visual data by imperceptibly embedding a digital watermark signal on the data.

Digital watermarking is the art and science of embedding copyright information in the original files. The information embedded is called ‘watermarks ‘. Digital watermarks are difficult to remove without noticeably degrading the content and are a covert means in situation where copyright fails to provide robustness.
4. CRYPTOGRAPHY

Mounting concern over the new threats to privacy and security has lead to wide spread adoption of cryptography. Cryptography is the science of transforming documents. It has mainly two functions

• Encryption
• Decryption

The purpose of encryption is to render a document unreadable by all except those who authorize to read it. Cryptographers refer to the content of the original document as plain text. Plain text is converted in to cipher form using an algorithm and a variable or key. The key is a randomly selected string of numbers.

Only after decoding the cipher text using the key the content of the document is revealed to the common people. Encryption schemes are classified in to

1. Symmetric encryption

In which the same key is used to both encode and decode the document.

2. Public key or asymmetric encryption

It requires a pair of keys: one for encrypting the plain text and the other for decrypting the cipher text. A file encrypted with one key of a pair can be decrypted with other key of the same pair.

5. CRYPTOGRAPHIC DATA AUTHENTICATION

To authenticate visual data each video camera is assigned a different public or private key pair, with private key hardwired within the cameras. A document encrypted with the private key of any particular camera can be decrypted with its own public key. This property is used to provide center authentication that is to trace back to the true origin of the data.

Before sending the video sequence to the central unit, cameras calculate a digital summary or digest of the video by means of a proper hash function. The digest is then encrypted with their private key. Encryption is done by considering the digitized value of the brightness of each pixel. Digital signal is a sequence of zeros and ones and it is encrypted with the private key using a proper algorithm. The signed digest thus obtained is then transmitted to the central unit together with the acquired visual sequence.

Later the signal digest is used to prove data integrity or to trace back to their origin. The signed digest is read using the public key of the camera which produce the video and check if it corresponds to the digest derived from the decrypted video content using the same hash function.

Any manipulation of the data will change the calculated image digest derived from the decrypted data. Any discrepancy between the decrypted digest and calculated image digest indicate that the data has been tampered, with identical digest indicates that the data is genuine.

Value of the visual data can be added by tying each frame to the particular label of the instant the frame has been produced yet. This can be achieved by printing date and time of creation of each frame. Any modification of either the date or time could be easily revealed since it would change the locally calculated image digest.

5.1 DRAWBACKS OF CRYPTOGRAPHIC AUTHENTICATION

Even though cryptographic data authentication is highly resistant to content tampering, it suffers from few drawbacks. They are as follows:

1. Knowledge of private key

If the manipulator knows the private key of the camera, he can change the digest to involve the modifications he had made on the actual sequence. But the possibility of such a thing is very small because the private key is hardwired within the camera.


2. Impossible to distinguish between malicious and innocuous modification

It is difficult to distinguish between malicious and innocuous manipulations if cryptography is used. Innocuous modifications include compression of the video sequences. These modifications are usually performed by the central unit whereas digest is calculated on the basis of the uncompressed data by the camera. So on compression the correspondence between the digest and data would be lost.

3. High requirements of video camera

To avoid the above discussed problem, the video camera should perform the compression of the video sequences prior to digest calculation. This requires the video camera to have high computation as storage requirements.

4. Delay in transmission

Digest calculations and encryption introduces a delay in transmission of video documents. This is harmful in system where the timely generation of alarm is critical.

5. Protecting privacy is difficult

A part of the program cannot be removed for privacy reasons since it will alter the calculated digest.

6. WATERMARKING

A digital watermark is a signal that is imperceptibly embedded within digital data. This signal can be detected or extracted by means of computations to make some assertions about the host data.

Digital watermark is a signal which added to a document to authenticate it and to prove the ownership. A commonly encountered digital watermark is the logo most television channels display on the top of the television screen. Not only does it advertise the channel but also provides the legal benefit of having a source signature persist during video recording. Watermark task consists of two main steps

1. Watermark casting:-in which the signal represented by the watermark is transmitted over the channel, that is in watermark casting an encoder function Є takes a host image ‘f’ and a watermark ‘w’ and generate a new image
Fw= Є (f, w)

2. Watermark detection:-in which the signal is received and extracted from possibly corrupted image.
Reply
Wink 
can i get report for this topic
Reply
to get information about the topic 3d password full report ,ppt and related topic refer the page link bellow

http://studentbank.in/report-3d-password...ull-report

http://studentbank.in/report-3d-password--14576

http://studentbank.in/report-3d-password-ppt
Reply
hello pls send me full detail of 3D PASSWORD FOR MORE SECURE AUTHENTICATION full report............
Reply

to get information about the topic 3D Password full report ppt and related topic refer the page link bellow

http://studentbank.in/report-3d-password...ull-report
http://studentbank.in/report-3d-password...ort?page=3

http://studentbank.in/report-3d-password...rt?page=11

http://studentbank.in/report-3d-password...rt?page=12
http://studentbank.in/report-3d-password...rt?page=13
http://studentbank.in/report-3d-password...rt?page=15

http://studentbank.in/report-3d-password--14576
Reply
Reply
please please send me the full report and ppt for 3D password for more secure authentication...very very urgent
Reply
Smile 
hi
plz send me urgent
email id: sahutonk[at]gmail.com
Reply
To get more information about the topic "3D PASSWORD FOR MORE SECURE AUTHENTICATION " please refer the page link below
http://studentbank.in/report-3d-password...6#pid17846

http://studentbank.in/report-3d-password...3#pid45073

http://studentbank.in/report-3d-password...ull-report
Reply
Where is the attachment of full report on 3d authentication and its code, I am only getting links and links but not actual attachments...
Please send the attachment of code and full report to:
pradeep1yadav1[at]gmail.com
Reply
Hi,
I am searching java code for 3d password, but i could't find it on this... Sad
Can you please provide me the exact page and page link for the same.

Or please mail me the source code :
pradeepyadav1988[at]gmail.com
Reply
To get full information or details of 3D PASSWORD FOR MORE SECURE AUTHENTICATION please have a look on the pages




http://studentbank.in/report-3d-password...ull-report

http://studentbank.in/report-3d-password...ort?page=4


http://studentbank.in/report-3d-password...?pid=45073

http://studentbank.in/report-3d-password...6#pid17846



if you again feel trouble on 3D PASSWORD FOR MORE SECURE AUTHENTICATION please reply in that page and ask specific fields in 3D PASSWORD FOR MORE SECURE AUTHENTICATION


Reply
Hi,

I searched on all above mentioned links, but couldn't find neither the source code nor attached report.
Only one report descirption i can see on the page.

Can you please provide the path to download:
1) Complete source code for the same
2) Attached doc report.

pradeepyadav1988[at]gmail.com
Reply

To get full information or details of 3D PASSWORD FOR MORE SECURE AUTHENTICATION please have a look on the pages


http://studentbank.in/report-3d-password...ull-report

http://studentbank.in/report-3d-password...ort?page=4


http://studentbank.in/report-3d-password...?pid=45073

http://studentbank.in/report-3d-password...6#pid17846



if you again feel trouble on 3D PASSWORD FOR MORE SECURE AUTHENTICATION please reply in that page and ask specific fields in 3D PASSWORD FOR MORE SECURE AUTHENTICATION
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: a more secure steganography method in spatial domain ppt, garage, seminar report 3d password, gradespeed klein, blacks canadian legal, full ppt on 3d password, what is secure authentication,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  computer networks full report seminar topics 8 42,403 06-10-2018, 12:35 PM
Last Post: jntuworldforum
  OBJECT TRACKING AND DETECTION full report project topics 9 30,876 06-10-2018, 12:20 PM
Last Post: jntuworldforum
  imouse full report computer science technology 3 25,115 17-06-2016, 12:16 PM
Last Post: ashwiniashok
  Implementation of RSA Algorithm Using Client-Server full report seminar topics 6 26,832 10-05-2016, 12:21 PM
Last Post: dhanabhagya
  Optical Computer Full Seminar Report Download computer science crazy 46 66,698 29-04-2016, 09:16 AM
Last Post: dhanabhagya
  ethical hacking full report computer science technology 41 74,810 18-03-2016, 04:51 PM
Last Post: seminar report asees
  broadband mobile full report project topics 7 23,577 27-02-2016, 12:32 PM
Last Post: Prupleannuani
  steganography full report project report tiger 15 41,625 11-02-2016, 02:02 PM
Last Post: seminar report asees
  Digital Signature Full Seminar Report Download computer science crazy 20 44,016 16-09-2015, 02:51 PM
Last Post: seminar report asees
  Mobile Train Radio Communication ( Download Full Seminar Report ) computer science crazy 10 28,038 01-05-2015, 03:36 PM
Last Post: seminar report asees

Forum Jump: