Sunday, November 10, 2013

Some Java Project Abstracts

Some java and dot.net projects from final-sem-projects.blogspot.in Search for videos of these projects under http://www.youtube.com/user/dpjegankumar?feature=watch ROBUST VIDEO DATA HIDING USING FORBIDDEN ZONE DATA HIDING AND SELECTIVE EMBEDDING ABSTRACT: Video data hiding is still an important research topic due to the design complexities involved. We propose a new video data hiding method that makes use of erasure correction capability of Repeat Accumulate codes and superiority of Forbidden Zone Data Hiding. Selective embedding is utilized in the proposed method to determine host signal samples suitable for data hiding. This method also contains a temporal synchronization scheme in order to withstand frame drop and insert attacks. The proposed framework is tested by typical broadcast material against MPEG-2, H.264 compression, frame-rate conversion attacks, as well as other well-known video data hiding methods. The decoding error values are reported for typical system parameters. The simulation results indicate that the framework can be successfully utilized in video data hiding applications. EXISTING SYSTEM: In special domain, the hiding process such as least significant bit(LSB) replacement, is done in special domain, while transform domain methods; hide data in another domain such as wavelet domain. Least significant bit (LSB) is the simplest form of Steganography. LSB is based on inserting data in the least significant bit of pixels, which lead to a slight change on the cover image that is not noticeable to human eye. Since this method can be easily cracked, it is more vulnerable to attacks. LSB method has intense affects on the statistical information of image like histogram. Attackers could be aware of a hidden communication by just checking the Histogram of an image. A good solution to eliminate this defect was LSB matching. LSB-Matching was a great step forward in Steganography methods and many others get ideas from it PROPOSED SYSTEM: Data hiding in video sequences is performed in two major ways: bit stream-level and data-level. In this paper, we propose a new block-based selective embedding type data hiding framework that encapsulates Forbidden Zone Data Hiding (FZDH) By means of simple rules applied to the frame markers, we introduce certain level of robustness against frame drop, repeat and insert attacks. ADVANTAGES User cannot find the original data. It is not easily cracked. To increase the Security . To increase the size of stored data. We can hide more than one bit. HARDWARE REQUIREMENTS SYSTEM : Pentium IV 2.4 GHz HARD DISK : 40 GB MONITOR : 15 VGA colour MOUSE : Logitech. RAM : 256 MB KEYBOARD : 110 keys enhanced. SOFTWARE REQUIREMENTS Operating system : Windows XP Professional Front End : JAVA Tool : NetBeans IDE MODULE: This project consists of developing two main modules and some sub-modules also. The main module are one is encryption module and the decryption module. These two modules are the main core for the application. MODULES Input Module : ENCRYPTION MODULE DECRYPTION MODULE DES Triple DES RSA Modules Description: Input Module: The Input Module is designed as such a way that the proposed system must be capable of handling any type of data formats, such as if the user wishes to hide any image format then it must be compatible with all usual image formats such as jpg, gif, bmp, it must be also compatible with video formats such as .avi, .flv, .wmf etc.. And also it must be compatible with various document formats, so that the user can be able to user any formats to hide the secret data. Encryption Module: In Encryption module, it consists of Key file part, where key file can be specified with the password as a special security in it. Then the user can type the data or else can upload the data also though the browse button, when it is clicked the open file dialog box is opened and where the user can select the secret message. Then the user can select the image or video file through another open file dialog box which is opened when the cover file button is clicked. Where the user can select the cover file and then the Hide button is clicked so that the secret data or message is hidden in cover file using Forbidden Zone Data Hiding Technique. Decryption Module: This module is the opposite as such as Encryption module where the Key file should be also specified same as that of encryption part. Then the user should select the encrypted cover file and then should select the extract button so that the hidden message is displayed in the text area specified in the application or else it is extracted to the place where the user specifies it. DES: This module consists of same as Encryption and Decryption part using DES algorithm. The Data Encryption Standard (DES) is a block cipher that uses shared secret encryption. Triple DES: This module consists of same as Encryption and Decryption part using Triple DES algorithm. Triple DES is the common name for the Triple Data Encryption Algorithm (TDEA or Triple DEA) block cipher, which applies the Data Encryption Standard (DES) cipher algorithm three times to each data block. RSA: This module consists of same as Encryption and Decryption part using RSA algorithm. RSA is the first algorithm known to be suitable for signing as well as encryption, and was one of the first great advances in public key cryptography. RSA is widely used in electronic commerce protocols, and is believed to be sufficiently secure given sufficiently long keys and the use of up-to-date implementations. REFERENCE: Ersin Esen and Aydin Alatan, “Robust Video Data Hiding Using Forbidden Zone Data Hiding And Selective Embedding”, IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL.21, NO.8, AUGUST 2011. ================================ Visual Cryptography Schemes for Secret Image Abstract A visual cryptography scheme (VCS) is a kind of secret sharing scheme which allows the encoding of a secret image into shares distributed to participants. The beauty of such a scheme is that a set of qualified participants is able to recover the secret image without any cryptographic knowledge and computation devices. An extended visual cryptography scheme (EVCS) is a kind of VCS which consists of meaningful shares (compared to the random shares of traditional VCS). In this paper, we propose a construction of EVCS which is realized by embedding random shares into meaningful covering shares, and we call it the embedded EVCS. Experimental results compare some of the well-known EVCSs proposed in recent years systematically, and show that the proposed embedded EVCS has competitive visual quality compared with many of the well-known EVCSs in the literature. In addition, it has many specific advantages against these well-known EVCSs, respectively. OUR PROPOSED ABSTRACT: Visual cryptography is one of the technique used to encrypt the images by dividing the original image into transparencies. The transparencies can be sent to the intended person, and at the other end the transparencies received person can decrypt the transparencies using our tool, thus gets the original image. Our proposed Visual cryptography provides the demonstration to the users to show how encryption and decryption can be done to the images. In this technology, the end user identifies an image, which is not the correct image. That is, while transmitting the image the sender will encrypt the image using our application here sender gets the two or more transparencies of the same image. Our application provides an option to the end user of encryption. The end user can divide the original image into number of different images. Using our application we can send encrypted images that are in the format of GIF And PNG. The encrypted transparencies can be saved in the machine and can be sent to the intended person by other means [source]. Scope: System provides a friendly environment to deal with images. Generally tools support only some kinds of image formats. Our application supports .gif and .png (portable network graphics) formatted images and our application has been developed using swing and applet technologies, hence provides a friendly environment to users. Existing System: Visual cryptography is the art and science of encrypting the image in such a way that no-one apart from the sender and intended recipient even realizes the original image, a form of security through obscurity. By contrast, cryptography obscures the original image, but it does not conceal the fact that it is not the actual image. Limitation:-The existing system does not provide a friendly environment to encrypt or decrypt the data (images). Proposed System: Proposed system Visual cryptography provides a friendly environment to deal with images. Generally cryptography tools supports only one kind of image formats. Our application supports .gif and .png (portable network graphics) formatted images and our application has been developed using swing and applet technologies, hence provides a friendly environment to users. Problem Definition: When ever we transmit the data(image) in the network, any unauthenticated person can read our data(image). In order to provide security to data(image) generally sender will encrypt the data(image) and send it the intended person and the receiver will decrypt the encrypted data(image) and uses it. Hardware Requirements: Processor: Intel or AMD processor computer RAM: 256 MB or more Hard Disk Space: 8 GB or more Software Requirements: Operating System: Windows X P Technologies: JAVA 6.0, Swing Tools: NetBeans 6.0 ========================== Organizing User Search Histories - Java Project Project Details Project Code JWA138 Title Organizing User Search Histories - Java Project Project Type Java Web Application Front End Net Beans Back End My SQL Project Cost Rs. 3999/-Rs. 1990/- (Offer Price) ABSTRACT However, the primary means of accessing information online is still through keyword queries to a search engine. A complex task such as travel arrangement has to be broken down into a number of co-dependent steps over a period of time. For instance, a user may first search on possible destinations, timeline, events, etc. After deciding when and where to go, the user may then search for the most suitable arrangements for air tickets, rental cars, lodging, meals, etc. Each step requires one or more queries, and each query results in one or more clicks on relevant pages. One important step towards enabling services and features that can help users during their complex search quests online is the capability to identify and group related queries together. Recently, some of the major search engines have introduced a new “Search History” feature, which allows users to track their online searches by recording their queries and click, Bing search engine on February of 2010. This history includes a sequence of four queries displayed in reverse chronological order together with their corresponding clicks. In addition to viewing their search history, users can manipulate it by manually editing and organizing related queries and clicks into groups, or by sharing them with their friends. While these features are helpful, the manual efforts involved can be disruptive and will be untenable as the search history gets longer over time. ============================ Analysis on Credit Card Fraud Detection Methods Project - Java Project Details Project Code JWI133 Title Analysis on Credit Card Fraud Detection Methods Project - Java Project Project Type Java Application Front End Eclipse Back End My SQL Project Cost Rs. 3999/-Rs. 1990/- (Offer Price) About the Project Due to the rise and rapid growth of E-Commerce, use of credit cards for online purchases has dramatically increased and it caused an explosion in the credit card fraud. As credit card becomes the most popular mode of payment for both online as well as regular purchase, cases of fraud associated with it are also rising. In real life, fraudulent transactions are scattered with genuine transactions and simple pattern matching techniques are not often sufficient to detect those frauds accurately. Implementation of efficient fraud detection systems has thus become imperative for all credit card issuing banks to minimize their losses. Many modern techniques based on Artificial Intelligence, Data mining, Fuzzy logic, Machine learning, Sequence Alignment, Genetic Programming etc., has evolved in detecting various credit card fraudulent transactions. A clear understanding on all these approaches will certainly lead to an efficient credit card fraud detection system. This paper presents a survey of various techniques used in credit card fraud detection mechanisms and evaluates each methodology based on certain design criteria.

No comments:

Post a Comment