Submit Search
Upload
IRJET- Hampering the Cloning Attacks in Online Social Networks
•
0 likes
•
15 views
IRJET Journal
Follow
https://www.irjet.net/archives/V5/i3/IRJET-V5I3924.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 3
Download now
Download to read offline
Recommended
Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior
Editor IJCATR
A Survey on Security for Server Using Spontaneous Face Detection
A Survey on Security for Server Using Spontaneous Face Detection
IJERA Editor
IRJET - Blur Me: Automatic Tagging Framework for Securing Photo Sharing i...
IRJET - Blur Me: Automatic Tagging Framework for Securing Photo Sharing i...
IRJET Journal
An Anti-Phishing Framework Based on Visual Cryptography
An Anti-Phishing Framework Based on Visual Cryptography
IRJET Journal
Naace Conference 2103 - Online safety: how well equipped are you and your sch...
Naace Conference 2103 - Online safety: how well equipped are you and your sch...
Naace Naace
Keystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email Authentication
YogeshIJTSRD
Ld3420072014
Ld3420072014
IJERA Editor
IRJET- Advance Driver Assistance System using Artificial Intelligence
IRJET- Advance Driver Assistance System using Artificial Intelligence
IRJET Journal
Recommended
Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior
Editor IJCATR
A Survey on Security for Server Using Spontaneous Face Detection
A Survey on Security for Server Using Spontaneous Face Detection
IJERA Editor
IRJET - Blur Me: Automatic Tagging Framework for Securing Photo Sharing i...
IRJET - Blur Me: Automatic Tagging Framework for Securing Photo Sharing i...
IRJET Journal
An Anti-Phishing Framework Based on Visual Cryptography
An Anti-Phishing Framework Based on Visual Cryptography
IRJET Journal
Naace Conference 2103 - Online safety: how well equipped are you and your sch...
Naace Conference 2103 - Online safety: how well equipped are you and your sch...
Naace Naace
Keystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email Authentication
YogeshIJTSRD
Ld3420072014
Ld3420072014
IJERA Editor
IRJET- Advance Driver Assistance System using Artificial Intelligence
IRJET- Advance Driver Assistance System using Artificial Intelligence
IRJET Journal
STEGSIGN: A DIGITAL IMAGE AUTHENTICATION MODEL USING STEGANOGRAPHY AND AES EN...
STEGSIGN: A DIGITAL IMAGE AUTHENTICATION MODEL USING STEGANOGRAPHY AND AES EN...
Journal For Research
A Survey on Privacy in Social Networking Websites
A Survey on Privacy in Social Networking Websites
IRJET Journal
IRJET- Recognizing User Portrait for Fraudulent Identification on Online ...
IRJET- Recognizing User Portrait for Fraudulent Identification on Online ...
IRJET Journal
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
IRJET Journal
Protecting Facebook Account From Malicious Attacking Applications
Protecting Facebook Account From Malicious Attacking Applications
IRJET Journal
Enhancing Social Network Security through Smart Credentials
Enhancing Social Network Security through Smart Credentials
IJCSIS Research Publications
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET Journal
Fake News Analyzer
Fake News Analyzer
IRJET Journal
Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.
IRJET Journal
Sensitive label privacy protection on social
Sensitive label privacy protection on social
IEEEFINALYEARPROJECTS
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET Journal
Digital Image Sham Detection Using Deep Learning
Digital Image Sham Detection Using Deep Learning
IRJET Journal
IRJET- DocLock Application for Secure Document Sharing
IRJET- DocLock Application for Secure Document Sharing
IRJET Journal
A Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social Images
IRJET Journal
AHP validated literature review of forgery type dependent passive image forge...
AHP validated literature review of forgery type dependent passive image forge...
IJECEIAES
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET Journal
My Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social Networks
IRJET Journal
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
IRJET Journal
A System for Detection and Prevention of Data Leak
A System for Detection and Prevention of Data Leak
IRJET Journal
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
More Related Content
Similar to IRJET- Hampering the Cloning Attacks in Online Social Networks
STEGSIGN: A DIGITAL IMAGE AUTHENTICATION MODEL USING STEGANOGRAPHY AND AES EN...
STEGSIGN: A DIGITAL IMAGE AUTHENTICATION MODEL USING STEGANOGRAPHY AND AES EN...
Journal For Research
A Survey on Privacy in Social Networking Websites
A Survey on Privacy in Social Networking Websites
IRJET Journal
IRJET- Recognizing User Portrait for Fraudulent Identification on Online ...
IRJET- Recognizing User Portrait for Fraudulent Identification on Online ...
IRJET Journal
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
IRJET Journal
Protecting Facebook Account From Malicious Attacking Applications
Protecting Facebook Account From Malicious Attacking Applications
IRJET Journal
Enhancing Social Network Security through Smart Credentials
Enhancing Social Network Security through Smart Credentials
IJCSIS Research Publications
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET Journal
Fake News Analyzer
Fake News Analyzer
IRJET Journal
Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.
IRJET Journal
Sensitive label privacy protection on social
Sensitive label privacy protection on social
IEEEFINALYEARPROJECTS
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET Journal
Digital Image Sham Detection Using Deep Learning
Digital Image Sham Detection Using Deep Learning
IRJET Journal
IRJET- DocLock Application for Secure Document Sharing
IRJET- DocLock Application for Secure Document Sharing
IRJET Journal
A Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social Images
IRJET Journal
AHP validated literature review of forgery type dependent passive image forge...
AHP validated literature review of forgery type dependent passive image forge...
IJECEIAES
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET Journal
My Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social Networks
IRJET Journal
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
IRJET Journal
A System for Detection and Prevention of Data Leak
A System for Detection and Prevention of Data Leak
IRJET Journal
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
IRJET Journal
Similar to IRJET- Hampering the Cloning Attacks in Online Social Networks
(20)
STEGSIGN: A DIGITAL IMAGE AUTHENTICATION MODEL USING STEGANOGRAPHY AND AES EN...
STEGSIGN: A DIGITAL IMAGE AUTHENTICATION MODEL USING STEGANOGRAPHY AND AES EN...
A Survey on Privacy in Social Networking Websites
A Survey on Privacy in Social Networking Websites
IRJET- Recognizing User Portrait for Fraudulent Identification on Online ...
IRJET- Recognizing User Portrait for Fraudulent Identification on Online ...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
Protecting Facebook Account From Malicious Attacking Applications
Protecting Facebook Account From Malicious Attacking Applications
Enhancing Social Network Security through Smart Credentials
Enhancing Social Network Security through Smart Credentials
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
Fake News Analyzer
Fake News Analyzer
Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.
Sensitive label privacy protection on social
Sensitive label privacy protection on social
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
Digital Image Sham Detection Using Deep Learning
Digital Image Sham Detection Using Deep Learning
IRJET- DocLock Application for Secure Document Sharing
IRJET- DocLock Application for Secure Document Sharing
A Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social Images
AHP validated literature review of forgery type dependent passive image forge...
AHP validated literature review of forgery type dependent passive image forge...
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
My Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social Networks
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
A System for Detection and Prevention of Data Leak
A System for Detection and Prevention of Data Leak
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Operating System chapter 9 (Virtual Memory)
Operating System chapter 9 (Virtual Memory)
NareenAsad
ALCOHOL PRODUCTION- Beer Brewing Process.pdf
ALCOHOL PRODUCTION- Beer Brewing Process.pdf
Madan Karki
Basics of Relay for Engineering Students
Basics of Relay for Engineering Students
kannan348865
AI in Healthcare Innovative use cases and applications.pdf
AI in Healthcare Innovative use cases and applications.pdf
mahaffeycheryld
CLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference Modal
SwarnaSLcse
Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..
MaherOthman7
Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...
Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...
Nitin Sonavane
Autodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptx
Mustafa Ahmed
21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx
rahulmanepalli02
Introduction to Artificial Intelligence and History of AI
Introduction to Artificial Intelligence and History of AI
Sheetal Jain
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptx
Mustafa Ahmed
Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...
IJECEIAES
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
IJECEIAES
5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...
archanaece3
handbook on reinforce concrete and detailing
handbook on reinforce concrete and detailing
AshishSingh1301
SLIDESHARE PPT-DECISION MAKING METHODS.pptx
SLIDESHARE PPT-DECISION MAKING METHODS.pptx
CHAIRMAN M
Geometric constructions Engineering Drawing.pdf
Geometric constructions Engineering Drawing.pdf
JNTUA
Performance enhancement of machine learning algorithm for breast cancer diagn...
Performance enhancement of machine learning algorithm for breast cancer diagn...
IJECEIAES
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
JNTUA
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Er.Sonali Nasikkar
Recently uploaded
(20)
Operating System chapter 9 (Virtual Memory)
Operating System chapter 9 (Virtual Memory)
ALCOHOL PRODUCTION- Beer Brewing Process.pdf
ALCOHOL PRODUCTION- Beer Brewing Process.pdf
Basics of Relay for Engineering Students
Basics of Relay for Engineering Students
AI in Healthcare Innovative use cases and applications.pdf
AI in Healthcare Innovative use cases and applications.pdf
CLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference Modal
Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..
Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...
Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...
Autodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptx
21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx
Introduction to Artificial Intelligence and History of AI
Introduction to Artificial Intelligence and History of AI
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptx
Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...
handbook on reinforce concrete and detailing
handbook on reinforce concrete and detailing
SLIDESHARE PPT-DECISION MAKING METHODS.pptx
SLIDESHARE PPT-DECISION MAKING METHODS.pptx
Geometric constructions Engineering Drawing.pdf
Geometric constructions Engineering Drawing.pdf
Performance enhancement of machine learning algorithm for breast cancer diagn...
Performance enhancement of machine learning algorithm for breast cancer diagn...
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
IRJET- Hampering the Cloning Attacks in Online Social Networks
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3939 HAMPERING THE CLONING ATTACKS IN ONLINE SOCIAL NETWORKS S. SWETHA1, M. VAISHNAVI2, M. VIDHYA3 1,2,3, B.Tech, Department of information technology, Valliammai engineering college, Tamilnadu, India. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract – The millions of active users all around the world are using online social network such as Facebook, Twitter, Tumbler and LinkedIn. The usage of online social network make it effortless to misuse user’s information and to identity cloning attack to form fake profile .Fake users misusing the authorized users information’s like text, photos and videos with or without the authorized user’s permission. This paper is designed to provide security to the user images in social networks. Hence, in this paper, when users upload the profile picture or photos it would be watermarked and updated. Any fake users uploading the same profile picture can be detected and their respective IP would be tracked and blocked. Thus if any user account is find suspicious, an automated scanning is performed. So when the fake user’s login next time, an alert message would be sent to the account owner and the user activities would be closely monitored. If the account owner doesn’t respond the alert message the account would be suspended with prior information. And also when users uploading their images to the cloud computing platform, they lose direct control on these data, so users worry that their personal privacy information will be leaked and misused. In order to protect the user's personal privacy, before uploading images to the server, the image needs to be encrypted. The image will be encrypted by DWT image steganography method (hiding one image inside another image). This paper would be useful for preventing the cloning attacks. Keywords: cloning attack, watermarking, personal privacy, DWT, steganography 1. INTRODUCTION Social networks are becoming so essential now a days and plays a bigger role in every day’s life for sharing personal information’s and knowledge sharing. Also social network is used to see the everyday activities, photos, videos and political activities happening. The millions of active users all around the world are using online social network such as Facebook, Twitter, Tumbler and LinkedIn. Thus the major concern in social network is fake users misusing the authorized user information like text, photos and videos with or without the authorized user permission. Currently many fake profiles have been created for fraudulent activities like money making, malware / virus / Trojan virus distribution to track the user behaviour. Also a research states many fake Profiles have been created for online social games. In existing social network, the individual information’s are kept secret and transmitted in a secure manner with user privacy preserving. Thus even intruders have breached the privacy preserving in many scenarios. Thus many privacy attacks have been identified now a days to steal the user personal information for malicious activities. Thus this leads to a huge security problems. CNET report in the year 2013 states Facebook has 8.7% fake users which are approx. 83.09 million users. Thus in existing fake users are been difficult to be tracked. Thus if any user account is find suspicious, an automated scanning is performed. So when the fake user’s login next time, an alert message would be sent to the account owner and the user activities would be closely monitored. If the account owner doesn’t respond the alert message the account would be suspended with prior information 2. EXISTING SYSTEM In the existing system, there is no security for profile images and shared images and also existing system defines the encryption mechanism with the help of a trusted party. A social network user might choose to encrypt photos before posting in a platform by employing some encrypted mechanisms such as attribute-based encryption. The existing system use traffic analyzing and graph analyzing method which all are human monitoring method and not automatic. 2.1 DISADVANTAGES No security for profile pictures. User profile pictures are misused for creating a fake profile. There is no effective secure transmission of images. 3. PROPOSED SYSTEM In the proposed paper, Watermarking techniques will be used to detect and identify such fake profiles. In this method, at any time a user uploads his/her pictures, some exclusive and useful information such as email or username would be attached to pictures by means of watermarking methods. Accordingly, in future, if somebody else saves that picture and attempts to create a fake profile with stolen data, the system is able to automatically detect this deception as fraud and would prevent and protect the fake user from any additional positive action. Our proposed system invokes discrete wavelet transform algorithm for data hiding. Thus this would prevent the clone attacks and providing complete user data privacy preserving. For watermarking technique Java static watermarking is been used. Any fake users updating the same profile picture can be detected and
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3940 their respective IP would be tracked and blocked. Also this system provide secure authentication by invoked certain attributes which can be asked to the users during registration. Thus we can able to avoid clone attacks in social media networks. 3.1 ADVANTAGES User identity are secured. User can securely transmit the images from the user side to cloud and also share images using DWT based image steganography. Clone attack is effectively prevented. 4. SYSTEM MODEL The Fig-1 explains the user activities such as sharing a image, uploading images to cloud. The admin can perform the actions such as authorization of the user, watermarking the image, verification, upload the steganographic images to the cloud storage. First the user has to register into the system. At the time of registration it will get all details and it will automatically obtain the IP address of the user. Then the user login in to the application and the admin checks whether the user is an authorized user and then permits the user to move on to the next level. The user will set the profile picture or sharing images to the application. It will automatically watermarked by his/her username in the image and uploaded in the system. Second step is that if any unknown user downloaded the image and after downloading he/she modify the image and try’s to upload in the system, it will validate the image. The validation is done by checking if there is any existence of watermark. If already any watermarking is in the image then an alert will send to the original user. Then the original user will decided whether to allow or not. If the original user will send a block message then the image cannot be uploaded. If the process has been repeated then the user IP will be blocked. Fig -1: ARCHITECTURE DIAGRAM When the user upload the images in the cloud, first the images will be secured by DWT steganography method that means hiding the original image inside the cover image and uploaded to the cloud. 5. MODULE DESCRIPTION 5.1 USER REGISTRATION The User wants to create an account and then only they are allowed to access the Application. Once the User creates an account, they can login to their account. All the user details will be stored in the database. During registration of the user, credentials like username, password, phone number and Email ID are obtained and also it will get the IP address. An application is designed for User Interface, Frame to Communicate with the Database through JDBC Coding using the programming Languages like Java.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3941 5.2 SHARING IMAGES The user can shared images or set profile pictures. The images will be watermarked and uploaded. A Static Watermark is a kind of marker covertly embedded in a noise-tolerant signal such as an audio, video or image data. It is typically used to identify ownership of the copyright of such signal. Watermarking is the process of hiding digital information in a carrier signal. In this method, at any time a user uploads his/her pictures, some exclusive and useful information such as email or username would be attached to pictures by means of watermarking methods. 5.3 ALERT AND BLOCK In this alert and block, system will automatically check the right and privilege of the user and ownership of uploaded file. Subsequently to checking the uploaded file, if the system finds the existence of watermark, it will send an announcement and a notification to the owner of original content and prevent user from re-uploading. Fake users updating the same profile picture can be detected and their respective IP would be tracked and blocked 5.4 DWT IMAGE STEGANOGRAPHY Image Steganography is the process of hiding an original image within the cover image and the extraction of it at its destination. Steganography is a technique of hiding an encrypted message so that no one suspects it exists. Dwt is a linear transformation operates on a data vector that separates data in to different frequency components. The wavelet transform separates the high frequency and low frequency information on a pixel. In this we were using Haar wavelet in this the low frequency wavelet coefficients will be obtained by averaging the two pixel values and the high frequency coefficients will be obtained by taking half of the difference of the two pixels. The obtained bands are Approximate band (LL), Vertical band(LH), Horizontal band(HL), Diagonal band(HH). 5.5 UPLOADING TO CLOUD The user can upload the images to the cloud in a secure manner. 6. CONCLUSION In this paper, cloning attack problem is studied. The proposed system provides result for providing security to the user profile images or shared images. An efficient watermarking algorithm is to provide security to the user images and to identify the fake users. Also, the fake profiles would be blocked in this system. The steganography is also used to provide security to the user images. The cloning attack across different social network can be prevented in future. ACKNOWLEDGEMENT We would like to thank our project guide Prof.Thenmozhi (Assistant Professor, Department of Information and Technology, Valliammai Engineering College), for their guidance throughout this project. We also like to thank our members of the department for their kind assistance and cooperation during the development of the project. 7. REFERENCES [1] Georges A.Kamhoua, Niki Pissinou, S.S.Iyengar, Jonathan Beltran, Charles Kamhoua, Brandon L Hernandez “Preventing Colluding Identity Clone Attacks in Online Social Networks”, IEEE 37th International conference on Distributed computing systems workshops, PP:187-192, 2017 [2] Mouro Conti, Radha Poovendran, Marco Secchiero “Fakebook: Detecting fake profiles in on-line social networks” IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, PP:1071-1078, 2012 [3] Po-Yueh Chen, Hung-Ju Lin “A DWT Based Approach For Image Steganography”, International Journal of Applied Science and Engineering, Volume:4 no: 3, 2006 [4] ] Chunyan Zhang, Jingbing Li, Shuangshuang Wang, Zhaohui Wang, “An encrypted medical image retrieval algorithm based on DWT-DCT frequency domain”, IEEE 15th international conference on software engineering research, management and applications(SERA),PP 135- 141,ISBN 978-1-5090-5756-6, 2017 [5] S.Priyanga, V.M.Priyadharshini, N.Hariharan “Prevention of Fake Profile Proliferatiion in Online Social Networks”, International Journal of Innovative Research in Science, Engineering and Technology, volume: 4, 2015.
Download now