Submit Search
Upload
IRJET- DocLock Application for Secure Document Sharing
•
0 likes
•
12 views
IRJET Journal
Follow
https://www.irjet.net/archives/V5/i11/IRJET-V5I1151.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 3
Download now
Download to read offline
Recommended
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET Journal
IRJET- Proximity Detection Warning System using Ray Casting
IRJET- Proximity Detection Warning System using Ray Casting
IRJET Journal
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET Journal
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
IRJET Journal
Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior
Editor IJCATR
Irjet v7 i4693
Irjet v7 i4693
aissmsblogs
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET Journal
Home Security Systems using Camera and Android Application
Home Security Systems using Camera and Android Application
IRJET Journal
Recommended
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET Journal
IRJET- Proximity Detection Warning System using Ray Casting
IRJET- Proximity Detection Warning System using Ray Casting
IRJET Journal
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET Journal
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
IRJET Journal
Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior
Editor IJCATR
Irjet v7 i4693
Irjet v7 i4693
aissmsblogs
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET Journal
Home Security Systems using Camera and Android Application
Home Security Systems using Camera and Android Application
IRJET Journal
50120140506001
50120140506001
IAEME Publication
Wmn06MODERNIZED INTRUSION DETECTION USING ENHANCED APRIORI ALGORITHM
Wmn06MODERNIZED INTRUSION DETECTION USING ENHANCED APRIORI ALGORITHM
ijwmn
IDS alert classification model
IDS alert classification model
dilipjangam91
IRJET-Analyzing user Behavior using Keystroke Dynamics
IRJET-Analyzing user Behavior using Keystroke Dynamics
IRJET Journal
Ijsrdv8 i10355
Ijsrdv8 i10355
aissmsblogs
43 automatic
43 automatic
aissmsblogs
Single sign on mechanism for distributed computing
Single sign on mechanism for distributed computing
eSAT Publishing House
145 148
145 148
Editor IJARCET
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
IJNSA Journal
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET Journal
False positive reduction by combining svm and knn algo
False positive reduction by combining svm and knn algo
eSAT Journals
Authentication framework using visual cryptography
Authentication framework using visual cryptography
eSAT Publishing House
Vishwanath rakesh ece 561
Vishwanath rakesh ece 561
RAKESH_CSU
Java Implementation based Heterogeneous Video Sequence Automated Surveillance...
Java Implementation based Heterogeneous Video Sequence Automated Surveillance...
CSCJournals
User centric machine learning for cyber security operation center
User centric machine learning for cyber security operation center
Sai Chandra Chittuluri
IRJET - Image Watermarking using QR Code
IRJET - Image Watermarking using QR Code
IRJET Journal
An Investigation into the Effectiveness of Machine Learning Techniques for In...
An Investigation into the Effectiveness of Machine Learning Techniques for In...
Oyeniyi Samuel
SECTZG629T_FR_2012HZ78512
SECTZG629T_FR_2012HZ78512
Najeem M Illyas
Weapon detection using artificial intelligence and deep learning for security...
Weapon detection using artificial intelligence and deep learning for security...
Venkat Projects
I018145157
I018145157
IOSR Journals
Object and Currency Detection for the Visually Impaired
Object and Currency Detection for the Visually Impaired
IRJET Journal
IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...
IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...
IRJET Journal
More Related Content
What's hot
50120140506001
50120140506001
IAEME Publication
Wmn06MODERNIZED INTRUSION DETECTION USING ENHANCED APRIORI ALGORITHM
Wmn06MODERNIZED INTRUSION DETECTION USING ENHANCED APRIORI ALGORITHM
ijwmn
IDS alert classification model
IDS alert classification model
dilipjangam91
IRJET-Analyzing user Behavior using Keystroke Dynamics
IRJET-Analyzing user Behavior using Keystroke Dynamics
IRJET Journal
Ijsrdv8 i10355
Ijsrdv8 i10355
aissmsblogs
43 automatic
43 automatic
aissmsblogs
Single sign on mechanism for distributed computing
Single sign on mechanism for distributed computing
eSAT Publishing House
145 148
145 148
Editor IJARCET
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
IJNSA Journal
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET Journal
False positive reduction by combining svm and knn algo
False positive reduction by combining svm and knn algo
eSAT Journals
Authentication framework using visual cryptography
Authentication framework using visual cryptography
eSAT Publishing House
Vishwanath rakesh ece 561
Vishwanath rakesh ece 561
RAKESH_CSU
Java Implementation based Heterogeneous Video Sequence Automated Surveillance...
Java Implementation based Heterogeneous Video Sequence Automated Surveillance...
CSCJournals
User centric machine learning for cyber security operation center
User centric machine learning for cyber security operation center
Sai Chandra Chittuluri
IRJET - Image Watermarking using QR Code
IRJET - Image Watermarking using QR Code
IRJET Journal
An Investigation into the Effectiveness of Machine Learning Techniques for In...
An Investigation into the Effectiveness of Machine Learning Techniques for In...
Oyeniyi Samuel
SECTZG629T_FR_2012HZ78512
SECTZG629T_FR_2012HZ78512
Najeem M Illyas
Weapon detection using artificial intelligence and deep learning for security...
Weapon detection using artificial intelligence and deep learning for security...
Venkat Projects
I018145157
I018145157
IOSR Journals
What's hot
(20)
50120140506001
50120140506001
Wmn06MODERNIZED INTRUSION DETECTION USING ENHANCED APRIORI ALGORITHM
Wmn06MODERNIZED INTRUSION DETECTION USING ENHANCED APRIORI ALGORITHM
IDS alert classification model
IDS alert classification model
IRJET-Analyzing user Behavior using Keystroke Dynamics
IRJET-Analyzing user Behavior using Keystroke Dynamics
Ijsrdv8 i10355
Ijsrdv8 i10355
43 automatic
43 automatic
Single sign on mechanism for distributed computing
Single sign on mechanism for distributed computing
145 148
145 148
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
False positive reduction by combining svm and knn algo
False positive reduction by combining svm and knn algo
Authentication framework using visual cryptography
Authentication framework using visual cryptography
Vishwanath rakesh ece 561
Vishwanath rakesh ece 561
Java Implementation based Heterogeneous Video Sequence Automated Surveillance...
Java Implementation based Heterogeneous Video Sequence Automated Surveillance...
User centric machine learning for cyber security operation center
User centric machine learning for cyber security operation center
IRJET - Image Watermarking using QR Code
IRJET - Image Watermarking using QR Code
An Investigation into the Effectiveness of Machine Learning Techniques for In...
An Investigation into the Effectiveness of Machine Learning Techniques for In...
SECTZG629T_FR_2012HZ78512
SECTZG629T_FR_2012HZ78512
Weapon detection using artificial intelligence and deep learning for security...
Weapon detection using artificial intelligence and deep learning for security...
I018145157
I018145157
Similar to IRJET- DocLock Application for Secure Document Sharing
Object and Currency Detection for the Visually Impaired
Object and Currency Detection for the Visually Impaired
IRJET Journal
IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...
IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...
IRJET Journal
IRJET- Intrusion Detection through Image Processing and Getting Notified ...
IRJET- Intrusion Detection through Image Processing and Getting Notified ...
IRJET Journal
IRJET- Android Malware Detection System
IRJET- Android Malware Detection System
IRJET Journal
IRJET- Real-Time Object Detection System using Caffe Model
IRJET- Real-Time Object Detection System using Caffe Model
IRJET Journal
Android Application For Decentralized Family Locator
Android Application For Decentralized Family Locator
IRJET Journal
Object Detection and Localization for Visually Impaired People using CNN
Object Detection and Localization for Visually Impaired People using CNN
IRJET Journal
ROAD POTHOLE DETECTION USING YOLOV4 DARKNET
ROAD POTHOLE DETECTION USING YOLOV4 DARKNET
IRJET Journal
Real Time Moving Object Detection for Day-Night Surveillance using AI
Real Time Moving Object Detection for Day-Night Surveillance using AI
IRJET Journal
Smart surveillance using deep learning
Smart surveillance using deep learning
International Journal of Reconfigurable and Embedded Systems
Object Detection Bot
Object Detection Bot
IRJET Journal
IRJET - Face Detection and Recognition System
IRJET - Face Detection and Recognition System
IRJET Journal
IRJET - pyScout: Employee Monitoring System by using Screen Capturing Tec...
IRJET - pyScout: Employee Monitoring System by using Screen Capturing Tec...
IRJET Journal
IRJET- Criminal Recognization in CCTV Surveillance Video
IRJET- Criminal Recognization in CCTV Surveillance Video
IRJET Journal
Precaution for Covid-19 based on Mask detection and sensor
Precaution for Covid-19 based on Mask detection and sensor
IRJET Journal
Convolutional Neural Network Based Real Time Object Detection Using YOLO V4
Convolutional Neural Network Based Real Time Object Detection Using YOLO V4
IRJET Journal
USING IMAGE CLASSIFICATION TO INCENTIVIZE RECYCLING
USING IMAGE CLASSIFICATION TO INCENTIVIZE RECYCLING
IRJET Journal
Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.
IRJET Journal
IRJET - Positioning and Tracking of a Person using Embedded Controller in a D...
IRJET - Positioning and Tracking of a Person using Embedded Controller in a D...
IRJET Journal
Security by user through application to lock/unlock machine by face detection
Security by user through application to lock/unlock machine by face detection
IRJET Journal
Similar to IRJET- DocLock Application for Secure Document Sharing
(20)
Object and Currency Detection for the Visually Impaired
Object and Currency Detection for the Visually Impaired
IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...
IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...
IRJET- Intrusion Detection through Image Processing and Getting Notified ...
IRJET- Intrusion Detection through Image Processing and Getting Notified ...
IRJET- Android Malware Detection System
IRJET- Android Malware Detection System
IRJET- Real-Time Object Detection System using Caffe Model
IRJET- Real-Time Object Detection System using Caffe Model
Android Application For Decentralized Family Locator
Android Application For Decentralized Family Locator
Object Detection and Localization for Visually Impaired People using CNN
Object Detection and Localization for Visually Impaired People using CNN
ROAD POTHOLE DETECTION USING YOLOV4 DARKNET
ROAD POTHOLE DETECTION USING YOLOV4 DARKNET
Real Time Moving Object Detection for Day-Night Surveillance using AI
Real Time Moving Object Detection for Day-Night Surveillance using AI
Smart surveillance using deep learning
Smart surveillance using deep learning
Object Detection Bot
Object Detection Bot
IRJET - Face Detection and Recognition System
IRJET - Face Detection and Recognition System
IRJET - pyScout: Employee Monitoring System by using Screen Capturing Tec...
IRJET - pyScout: Employee Monitoring System by using Screen Capturing Tec...
IRJET- Criminal Recognization in CCTV Surveillance Video
IRJET- Criminal Recognization in CCTV Surveillance Video
Precaution for Covid-19 based on Mask detection and sensor
Precaution for Covid-19 based on Mask detection and sensor
Convolutional Neural Network Based Real Time Object Detection Using YOLO V4
Convolutional Neural Network Based Real Time Object Detection Using YOLO V4
USING IMAGE CLASSIFICATION TO INCENTIVIZE RECYCLING
USING IMAGE CLASSIFICATION TO INCENTIVIZE RECYCLING
Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.
IRJET - Positioning and Tracking of a Person using Embedded Controller in a D...
IRJET - Positioning and Tracking of a Person using Embedded Controller in a D...
Security by user through application to lock/unlock machine by face detection
Security by user through application to lock/unlock machine by face detection
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
abhishek36461
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
ranjana rawat
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
purnimasatapathy1234
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
ssuser7cb4ff
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
britheesh05
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
959SahilShah
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Suhani Kapoor
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
KurinjimalarL3
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
eptoze12
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
GDSCAESB
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
power system scada applications and uses
power system scada applications and uses
DevarapalliHaritha
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
DeepakSakkari2
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Dr.Costas Sachpazis
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Dr.Costas Sachpazis
microprocessor 8085 and its interfacing
microprocessor 8085 and its interfacing
jaychoudhary37
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
RajaP95
Recently uploaded
(20)
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
power system scada applications and uses
power system scada applications and uses
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
microprocessor 8085 and its interfacing
microprocessor 8085 and its interfacing
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
IRJET- DocLock Application for Secure Document Sharing
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 276 DocLock Application for Secure Document Sharing Nayan Jain1, Vishal Wadhwani2, Bhavik Jain3 1,2,3B.E.:Computer Engineering Dept., VESIT, Mumbai, India. -----------------------------------------------------------------------***-------------------------------------------------------------------- Abstract - The framework proposed in this paper provides an effective method for secure document sharing. The suggested method is based on Facial Recognition, Self- Destruct Timer and Screenshot Prevention Mechanism. With the Screenshot Prevention Mechanism, you can prevent recipients from forwarding, copying or even saving your file. In this paper we use Convolutional Neural Network for Facial Recognition so that only the intended receiver can open the file. This secure application will be suitable to work on android platform. The designed method provides confidentiality of a file and the integrity. Key Words: CNN, Screenshot Prevention Mechanism, Self- Destruct Timer, FLAG_SECURE, Two Stream CNN. 1. INTRODUCTION Misuse of personal information is a serious problem for all individuals. The current process for transferring important documents or files between electronic devices is achieved by the means of e-mail or general chat applications. These data are sent in PDF, DOCX or image format. This mode of transfer can be vulnerable if the data sent is accessed by a person other than the intended receiver. The problem mentioned can be solved if no other user is given access to open the document other than the intended one. The proposed system uses face detection technique to detect and grant access to only the intended receiver. Also the information sent to the receiver must be deleted after use and not redirected to someone else, but sometimes the information is misused for purposes other than what an individual desires. This issue is resolved by the proposed framework by preventing the receiver from taking screenshot of the data or downloading it. The self destruct feature will allow the data to be persistent only for two days on the receiver’s device. 2. EXISTING SYSTEM Existing system refers to the traditional framework that was followed till now for transferring documents or other sensitive information. It was a one layer secured framework with pin or password protection. Using these frameworks an individual could send any file as a message to the receiver. The receiver would then download the file and use it. The respective file is then opened in the editor for further use. The disadvantages of the existing system are: ● In the traditional framework the only protection available are pattern and pin protection. ● The problem is that if any individual gets hold of this then security can be compromised. ● Receiver can still take a screenshot of the given file which makes this framework redundant. ● Also if a person forgets his/her password then opening the document again can be really difficult. ● After completion of a task keeping a file with an individual makes no sense. ● If other apps are given access to our app then security can be compromised. ● User interface is complex to be used by a novice. ● The algorithms used are time consuming and the low efficacy is undesirable. ● The content of the app is visible in the recent activities tab. 3. PROPOSED SYSTEM The proposed system will eliminate all the anomalies of the existing system by having the following features: ● All users while registering will have to provide their face ids along with their basic information. When the user uploads a document, it will automatically be converted to an image format and then it will be sent.The sender needs to add the email address of the receiver. ● On receiving the images of the document, the receiver will be allowed to open the application but not the images directly. ● The face ids of the receiver will be verified in order to view the images.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 277 ● Each time when the file is accessed, face id will be verified. ● While accessing the file, screen capture will be restricted. ● The received file will disappear within two days. ● The content of the app will not be visible in the recent activities tab. The advantages of the proposed system are: ● By preventing screen capturing, the images can’t be misused. ● The application will display a blank display in the recent activities tab which mean not even a slight detail will be visible to other people through the recent activities tab. ● The self destruct feature will ensure that the information doesn’t remain with the receiver after two days. ● The features will ensure complete security of the information of a user. 4. SCREEN CAPTURE BLOCKING It is possible to block users from taking screenshot in android application. The WindowManager.LayoutParams class in Android provides a constant FLAG_SECURE to restrict screen capture of the present window. It treats the content of the window as secure, preventing it from appearing in screenshots or from being viewed on non- secure displays. Android’s FLAG_SECURE also blocks users from recording the screen using a third party screen recorder application. Table 1: Sample Code to use FLAG_SECURE: 5. FACIAL RECOGNITION A Convolutional Neural Network consist of network made up of neurons with weights and biases that can be changed. Every neuron performs a dot product with the input and forwards it. The network on whole takes an image as an input and gives a single differentiable score function as an output. We take the explicit assumption that an image is given as an input as it allows us to encode certain properties into the architecture. These then make the forward function more efficient to implement and vastly reduces the amount of parameters required by the network. For the project, we developed our face detection methods using the following approaches: First, we developed a model called Two Stream CNN, which specializes in classification and localization for a single face detection. With an input image, this Two Stream CNN method is capable to output whether it contains a human face or not, and if there is a human face, it would also output the identity of that human (classification) as well as the coordinate and the size of the bounding box (localization). We also try to perform our multi-object detection with a cascade of Region of Interest Network and Two Stream CNN. This ROI Network helps in eliminating the number of repetitions required. protected void onCreate(Bundle savedInstanceState) { super.onCreate(savedInstanceState); getWindow().setFlags(WindowManager.Layout Par ams.FLAG_SECURE, WindowManager.LayoutParams.FLAG_SECUR E) ; setContentView(R.layout.activity_main); }
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 278 FIGURE 5. The red input layer represents an image with the height, width and breadth represented by the the three colours. Considering the complexity of data security there is a need for a lot of research on this subject in the future. In the following paragraph we would thus like to list few open research issue associated with security. ● Encryption: If a miscreant tries getting the file from the network then end to end encryption will safeguard the data from being accessed. ● iOS: Our system considers only Android OS but we can develop this application for iOS too in the future. ● Facial Recognition: Our application only uses images to verify user but we can also add support for a combination of light projectors and sensors to take several images of users facial features and train our network. ● Other risk: We should remember that one can always point a camera on the screen to steal the content. We cannot stop someone from from doing that but we can assign every file sent with some key unique to that user so that he may be deterred to do it. REFERENCES 1) Yicheng An, Jiafu Wu, Chang Yue(2016). CNNs for Face Detection and Recognition. 2016 CVPR J. Clerk Maxwell,” A Treatise on Electricity and Magnetism”, 3rd ed., vol. 2. Oxford: Clarendon, 1892, pp.68-73. 2) Justin Johnson(2017). Derivatives, Backpropagation, and Vectorization. 2017 CVPR 3) Yoshua Bengio (2012). Practical Recommendations for Gradient-Based Training of Deep Architectures. 4) CS231n: Convolutional Neural Networks for Visual Recognition. Retrieved Spring 2017, from http://cs231n.stanford.edu/syllabus.html 5) Vinothkumar Arputharaj. Disabling screen shot capture in Android application (2015, June18), Retrieved from https://stackandroid.com/tutorial/disabling-screen- shot-capture-in-andr oid-application/ 6. CONCLUSIONS The proposed framework describes the way important documents or files can be securely transferred between two android devices. The framework uses face detection and screen capture blocking technique for security of the data. Users will be able to transfer information with the assurance that it reached the intended person.
Download now