SlideShare a Scribd company logo
1 of 3
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3939
HAMPERING THE CLONING ATTACKS IN ONLINE SOCIAL NETWORKS
S. SWETHA1, M. VAISHNAVI2, M. VIDHYA3
1,2,3, B.Tech, Department of information technology, Valliammai engineering college, Tamilnadu, India.
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract – The millions of active users all around the
world are using online social network such as Facebook,
Twitter, Tumbler and LinkedIn. The usage of online social
network make it effortless to misuse user’s information and
to identity cloning attack to form fake profile .Fake users
misusing the authorized users information’s like text, photos
and videos with or without the authorized user’s permission.
This paper is designed to provide security to the user
images in social networks. Hence, in this paper, when users
upload the profile picture or photos it would be
watermarked and updated. Any fake users uploading the
same profile picture can be detected and their respective IP
would be tracked and blocked. Thus if any user account is
find suspicious, an automated scanning is performed. So
when the fake user’s login next time, an alert message would
be sent to the account owner and the user activities would
be closely monitored. If the account owner doesn’t respond
the alert message the account would be suspended with
prior information. And also when users uploading their
images to the cloud computing platform, they lose direct
control on these data, so users worry that their personal
privacy information will be leaked and misused. In order to
protect the user's personal privacy, before uploading images
to the server, the image needs to be encrypted. The image
will be encrypted by DWT image steganography method
(hiding one image inside another image). This paper would
be useful for preventing the cloning attacks.
Keywords: cloning attack, watermarking, personal
privacy, DWT, steganography
1. INTRODUCTION
Social networks are becoming so essential now a days and
plays a bigger role in every day’s life for sharing personal
information’s and knowledge sharing. Also social network
is used to see the everyday activities, photos, videos and
political activities happening. The millions of active users
all around the world are using online social network such
as Facebook, Twitter, Tumbler and LinkedIn. Thus the
major concern in social network is fake users misusing the
authorized user information like text, photos and videos
with or without the authorized user permission. Currently
many fake profiles have been created for fraudulent
activities like money making, malware / virus / Trojan
virus distribution to track the user behaviour. Also a
research states many fake Profiles have been created for
online social games. In existing social network, the
individual information’s are kept secret and transmitted in
a secure manner with user privacy preserving. Thus even
intruders have breached the privacy preserving in many
scenarios. Thus many privacy attacks have been identified
now a days to steal the user personal information for
malicious activities. Thus this leads to a huge security
problems. CNET report in the year 2013 states Facebook
has 8.7% fake users which are approx. 83.09 million users.
Thus in existing fake users are been difficult to be tracked.
Thus if any user account is find suspicious, an automated
scanning is performed. So when the fake user’s login next
time, an alert message would be sent to the account owner
and the user activities would be closely monitored. If the
account owner doesn’t respond the alert message the
account would be suspended with prior information
2. EXISTING SYSTEM
In the existing system, there is no security for profile
images and shared images and also existing system
defines the encryption mechanism with the help of a
trusted party. A social network user might choose to
encrypt photos before posting in a platform by employing
some encrypted mechanisms such as attribute-based
encryption. The existing system use traffic analyzing and
graph analyzing method which all are human monitoring
method and not automatic.
2.1 DISADVANTAGES
 No security for profile pictures. User profile
pictures are misused for creating a fake profile.
 There is no effective secure transmission of
images.
3. PROPOSED SYSTEM
In the proposed paper, Watermarking techniques will be
used to detect and identify such fake profiles. In this
method, at any time a user uploads his/her pictures, some
exclusive and useful information such as email or
username would be attached to pictures by means of
watermarking methods. Accordingly, in future, if
somebody else saves that picture and attempts to create a
fake profile with stolen data, the system is able to
automatically detect this deception as fraud and would
prevent and protect the fake user from any additional
positive action. Our proposed system invokes discrete
wavelet transform algorithm for data hiding. Thus this
would prevent the clone attacks and providing complete
user data privacy preserving. For watermarking technique
Java static watermarking is been used. Any fake users
updating the same profile picture can be detected and
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3940
their respective IP would be tracked and blocked. Also this
system provide secure authentication by invoked certain
attributes which can be asked to the users during
registration. Thus we can able to avoid clone attacks in
social media networks.
3.1 ADVANTAGES
 User identity are secured.
 User can securely transmit the images from the
user side to cloud and also share images using
DWT based image steganography.
 Clone attack is effectively prevented.
4. SYSTEM MODEL
The Fig-1 explains the user activities such as sharing a
image, uploading images to cloud. The admin can perform
the actions such as authorization of the user,
watermarking the image, verification, upload the
steganographic images to the cloud storage.
First the user has to register into the system. At the time of
registration it will get all details and it will automatically
obtain the IP address of the user. Then the user login in to
the application and the admin checks whether the user is
an authorized user and then permits the user to move on
to the next level. The user will set the profile picture or
sharing images to the application. It will automatically
watermarked by his/her username in the image and
uploaded in the system.
Second step is that if any unknown user downloaded the
image and after downloading he/she modify the image
and try’s to upload in the system, it will validate the image.
The validation is done by checking if there is any existence
of watermark. If already any watermarking is in the image
then an alert will send to the original user. Then the
original user will decided whether to allow or not. If the
original user will send a block message then the image
cannot be uploaded. If the process has been repeated then
the user IP will be blocked.
Fig -1: ARCHITECTURE DIAGRAM
When the user upload the images in the cloud,
first the images will be secured by DWT steganography
method that means hiding the original image inside the
cover image and uploaded to the cloud.
5. MODULE DESCRIPTION
5.1 USER REGISTRATION
The User wants to create an account and then only they
are allowed to access the Application. Once the User
creates an account, they can login to their account. All the
user details will be stored in the database. During
registration of the user, credentials like username,
password, phone number and Email ID are obtained and
also it will get the IP address. An application is designed
for User Interface, Frame to Communicate with the
Database through JDBC Coding using the programming
Languages like Java.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3941
5.2 SHARING IMAGES
The user can shared images or set profile pictures. The
images will be watermarked and uploaded. A Static
Watermark is a kind of marker covertly embedded in a
noise-tolerant signal such as an audio, video or image data.
It is typically used to identify ownership of the copyright
of such signal. Watermarking is the process of hiding
digital information in a carrier signal. In this method, at
any time a user uploads his/her pictures, some exclusive
and useful information such as email or username would
be attached to pictures by means of watermarking
methods.
5.3 ALERT AND BLOCK
In this alert and block, system will automatically check the
right and privilege of the user and ownership of uploaded
file. Subsequently to checking the uploaded file, if the
system finds the existence of watermark, it will send an
announcement and a notification to the owner of original
content and prevent user from re-uploading. Fake users
updating the same profile picture can be detected and
their respective IP would be tracked and blocked
5.4 DWT IMAGE STEGANOGRAPHY
Image Steganography is the process of hiding an original
image within the cover image and the extraction of it at its
destination. Steganography is a technique of hiding an
encrypted message so that no one suspects it exists. Dwt is
a linear transformation operates on a data vector that
separates data in to different frequency components. The
wavelet transform separates the high frequency and low
frequency information on a pixel. In this we were using
Haar wavelet in this the low frequency wavelet
coefficients will be obtained by averaging the two pixel
values and the high frequency coefficients will be obtained
by taking half of the difference of the two pixels. The
obtained bands are Approximate band (LL), Vertical
band(LH), Horizontal band(HL), Diagonal band(HH).
5.5 UPLOADING TO CLOUD
The user can upload the images to the cloud in a secure
manner.
6. CONCLUSION
In this paper, cloning attack problem is studied. The
proposed system provides result for providing security to
the user profile images or shared images. An efficient
watermarking algorithm is to provide security to the user
images and to identify the fake users. Also, the fake
profiles would be blocked in this system. The
steganography is also used to provide security to the user
images. The cloning attack across different social network
can be prevented in future.
ACKNOWLEDGEMENT
We would like to thank our project guide Prof.Thenmozhi
(Assistant Professor, Department of Information and
Technology, Valliammai Engineering College), for their
guidance throughout this project. We also like to thank our
members of the department for their kind assistance and
cooperation during the development of the project.
7. REFERENCES
[1] Georges A.Kamhoua, Niki Pissinou, S.S.Iyengar,
Jonathan Beltran, Charles Kamhoua, Brandon L Hernandez
“Preventing Colluding Identity Clone Attacks in Online
Social Networks”, IEEE 37th International conference on
Distributed computing systems workshops, PP:187-192,
2017
[2] Mouro Conti, Radha Poovendran, Marco Secchiero
“Fakebook: Detecting fake profiles in on-line social
networks” IEEE/ACM International Conference on
Advances in Social Networks Analysis and Mining,
PP:1071-1078, 2012
[3] Po-Yueh Chen, Hung-Ju Lin “A DWT Based Approach
For Image Steganography”, International Journal of
Applied Science and Engineering, Volume:4 no: 3, 2006
[4] ] Chunyan Zhang, Jingbing Li, Shuangshuang Wang,
Zhaohui Wang, “An encrypted medical image retrieval
algorithm based on DWT-DCT frequency domain”, IEEE
15th international conference on software engineering
research, management and applications(SERA),PP 135-
141,ISBN 978-1-5090-5756-6, 2017
[5] S.Priyanga, V.M.Priyadharshini, N.Hariharan
“Prevention of Fake Profile Proliferatiion in Online Social
Networks”, International Journal of Innovative Research in
Science, Engineering and Technology, volume: 4, 2015.

More Related Content

Similar to IRJET- Hampering the Cloning Attacks in Online Social Networks

STEGSIGN: A DIGITAL IMAGE AUTHENTICATION MODEL USING STEGANOGRAPHY AND AES EN...
STEGSIGN: A DIGITAL IMAGE AUTHENTICATION MODEL USING STEGANOGRAPHY AND AES EN...STEGSIGN: A DIGITAL IMAGE AUTHENTICATION MODEL USING STEGANOGRAPHY AND AES EN...
STEGSIGN: A DIGITAL IMAGE AUTHENTICATION MODEL USING STEGANOGRAPHY AND AES EN...Journal For Research
 
A Survey on Privacy in Social Networking Websites
A Survey on Privacy in Social Networking WebsitesA Survey on Privacy in Social Networking Websites
A Survey on Privacy in Social Networking WebsitesIRJET Journal
 
IRJET- Recognizing User Portrait for Fraudulent Identification on Online ...
IRJET-  	  Recognizing User Portrait for Fraudulent Identification on Online ...IRJET-  	  Recognizing User Portrait for Fraudulent Identification on Online ...
IRJET- Recognizing User Portrait for Fraudulent Identification on Online ...IRJET Journal
 
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...IRJET Journal
 
Protecting Facebook Account From Malicious Attacking Applications
Protecting Facebook Account From Malicious Attacking ApplicationsProtecting Facebook Account From Malicious Attacking Applications
Protecting Facebook Account From Malicious Attacking ApplicationsIRJET Journal
 
Enhancing Social Network Security through Smart Credentials
Enhancing Social Network Security through Smart CredentialsEnhancing Social Network Security through Smart Credentials
Enhancing Social Network Security through Smart CredentialsIJCSIS Research Publications
 
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing AttacksIRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing AttacksIRJET Journal
 
Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.IRJET Journal
 
Sensitive label privacy protection on social
Sensitive label privacy protection on socialSensitive label privacy protection on social
Sensitive label privacy protection on socialIEEEFINALYEARPROJECTS
 
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...IRJET Journal
 
Digital Image Sham Detection Using Deep Learning
Digital Image Sham Detection Using Deep LearningDigital Image Sham Detection Using Deep Learning
Digital Image Sham Detection Using Deep LearningIRJET Journal
 
IRJET- DocLock Application for Secure Document Sharing
IRJET- DocLock Application for Secure Document SharingIRJET- DocLock Application for Secure Document Sharing
IRJET- DocLock Application for Secure Document SharingIRJET Journal
 
A Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social ImagesA Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social ImagesIRJET Journal
 
AHP validated literature review of forgery type dependent passive image forge...
AHP validated literature review of forgery type dependent passive image forge...AHP validated literature review of forgery type dependent passive image forge...
AHP validated literature review of forgery type dependent passive image forge...IJECEIAES
 
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear AttacksIRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear AttacksIRJET Journal
 
My Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social NetworksMy Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social NetworksIRJET Journal
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET Journal
 
A System for Detection and Prevention of Data Leak
A System for Detection and Prevention of Data LeakA System for Detection and Prevention of Data Leak
A System for Detection and Prevention of Data LeakIRJET Journal
 
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...IRJET Journal
 

Similar to IRJET- Hampering the Cloning Attacks in Online Social Networks (20)

STEGSIGN: A DIGITAL IMAGE AUTHENTICATION MODEL USING STEGANOGRAPHY AND AES EN...
STEGSIGN: A DIGITAL IMAGE AUTHENTICATION MODEL USING STEGANOGRAPHY AND AES EN...STEGSIGN: A DIGITAL IMAGE AUTHENTICATION MODEL USING STEGANOGRAPHY AND AES EN...
STEGSIGN: A DIGITAL IMAGE AUTHENTICATION MODEL USING STEGANOGRAPHY AND AES EN...
 
A Survey on Privacy in Social Networking Websites
A Survey on Privacy in Social Networking WebsitesA Survey on Privacy in Social Networking Websites
A Survey on Privacy in Social Networking Websites
 
IRJET- Recognizing User Portrait for Fraudulent Identification on Online ...
IRJET-  	  Recognizing User Portrait for Fraudulent Identification on Online ...IRJET-  	  Recognizing User Portrait for Fraudulent Identification on Online ...
IRJET- Recognizing User Portrait for Fraudulent Identification on Online ...
 
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
 
Protecting Facebook Account From Malicious Attacking Applications
Protecting Facebook Account From Malicious Attacking ApplicationsProtecting Facebook Account From Malicious Attacking Applications
Protecting Facebook Account From Malicious Attacking Applications
 
Enhancing Social Network Security through Smart Credentials
Enhancing Social Network Security through Smart CredentialsEnhancing Social Network Security through Smart Credentials
Enhancing Social Network Security through Smart Credentials
 
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing AttacksIRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
 
Fake News Analyzer
Fake News AnalyzerFake News Analyzer
Fake News Analyzer
 
Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.
 
Sensitive label privacy protection on social
Sensitive label privacy protection on socialSensitive label privacy protection on social
Sensitive label privacy protection on social
 
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
 
Digital Image Sham Detection Using Deep Learning
Digital Image Sham Detection Using Deep LearningDigital Image Sham Detection Using Deep Learning
Digital Image Sham Detection Using Deep Learning
 
IRJET- DocLock Application for Secure Document Sharing
IRJET- DocLock Application for Secure Document SharingIRJET- DocLock Application for Secure Document Sharing
IRJET- DocLock Application for Secure Document Sharing
 
A Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social ImagesA Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social Images
 
AHP validated literature review of forgery type dependent passive image forge...
AHP validated literature review of forgery type dependent passive image forge...AHP validated literature review of forgery type dependent passive image forge...
AHP validated literature review of forgery type dependent passive image forge...
 
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear AttacksIRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
 
My Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social NetworksMy Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social Networks
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
 
A System for Detection and Prevention of Data Leak
A System for Detection and Prevention of Data LeakA System for Detection and Prevention of Data Leak
A System for Detection and Prevention of Data Leak
 
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Operating System chapter 9 (Virtual Memory)
Operating System chapter 9 (Virtual Memory)Operating System chapter 9 (Virtual Memory)
Operating System chapter 9 (Virtual Memory)NareenAsad
 
ALCOHOL PRODUCTION- Beer Brewing Process.pdf
ALCOHOL PRODUCTION- Beer Brewing Process.pdfALCOHOL PRODUCTION- Beer Brewing Process.pdf
ALCOHOL PRODUCTION- Beer Brewing Process.pdfMadan Karki
 
Basics of Relay for Engineering Students
Basics of Relay for Engineering StudentsBasics of Relay for Engineering Students
Basics of Relay for Engineering Studentskannan348865
 
AI in Healthcare Innovative use cases and applications.pdf
AI in Healthcare Innovative use cases and applications.pdfAI in Healthcare Innovative use cases and applications.pdf
AI in Healthcare Innovative use cases and applications.pdfmahaffeycheryld
 
CLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference ModalCLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference ModalSwarnaSLcse
 
Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..MaherOthman7
 
Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...
Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...
Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...Nitin Sonavane
 
Autodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptxAutodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptxMustafa Ahmed
 
21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docxrahulmanepalli02
 
Introduction to Artificial Intelligence and History of AI
Introduction to Artificial Intelligence and History of AIIntroduction to Artificial Intelligence and History of AI
Introduction to Artificial Intelligence and History of AISheetal Jain
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxMustafa Ahmed
 
Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...IJECEIAES
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksIJECEIAES
 
5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...archanaece3
 
handbook on reinforce concrete and detailing
handbook on reinforce concrete and detailinghandbook on reinforce concrete and detailing
handbook on reinforce concrete and detailingAshishSingh1301
 
SLIDESHARE PPT-DECISION MAKING METHODS.pptx
SLIDESHARE PPT-DECISION MAKING METHODS.pptxSLIDESHARE PPT-DECISION MAKING METHODS.pptx
SLIDESHARE PPT-DECISION MAKING METHODS.pptxCHAIRMAN M
 
Geometric constructions Engineering Drawing.pdf
Geometric constructions Engineering Drawing.pdfGeometric constructions Engineering Drawing.pdf
Geometric constructions Engineering Drawing.pdfJNTUA
 
Performance enhancement of machine learning algorithm for breast cancer diagn...
Performance enhancement of machine learning algorithm for breast cancer diagn...Performance enhancement of machine learning algorithm for breast cancer diagn...
Performance enhancement of machine learning algorithm for breast cancer diagn...IJECEIAES
 
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfInvolute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfJNTUA
 
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfInstruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfEr.Sonali Nasikkar
 

Recently uploaded (20)

Operating System chapter 9 (Virtual Memory)
Operating System chapter 9 (Virtual Memory)Operating System chapter 9 (Virtual Memory)
Operating System chapter 9 (Virtual Memory)
 
ALCOHOL PRODUCTION- Beer Brewing Process.pdf
ALCOHOL PRODUCTION- Beer Brewing Process.pdfALCOHOL PRODUCTION- Beer Brewing Process.pdf
ALCOHOL PRODUCTION- Beer Brewing Process.pdf
 
Basics of Relay for Engineering Students
Basics of Relay for Engineering StudentsBasics of Relay for Engineering Students
Basics of Relay for Engineering Students
 
AI in Healthcare Innovative use cases and applications.pdf
AI in Healthcare Innovative use cases and applications.pdfAI in Healthcare Innovative use cases and applications.pdf
AI in Healthcare Innovative use cases and applications.pdf
 
CLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference ModalCLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference Modal
 
Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..
 
Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...
Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...
Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...
 
Autodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptxAutodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptx
 
21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx
 
Introduction to Artificial Intelligence and History of AI
Introduction to Artificial Intelligence and History of AIIntroduction to Artificial Intelligence and History of AI
Introduction to Artificial Intelligence and History of AI
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptx
 
Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
 
5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...
 
handbook on reinforce concrete and detailing
handbook on reinforce concrete and detailinghandbook on reinforce concrete and detailing
handbook on reinforce concrete and detailing
 
SLIDESHARE PPT-DECISION MAKING METHODS.pptx
SLIDESHARE PPT-DECISION MAKING METHODS.pptxSLIDESHARE PPT-DECISION MAKING METHODS.pptx
SLIDESHARE PPT-DECISION MAKING METHODS.pptx
 
Geometric constructions Engineering Drawing.pdf
Geometric constructions Engineering Drawing.pdfGeometric constructions Engineering Drawing.pdf
Geometric constructions Engineering Drawing.pdf
 
Performance enhancement of machine learning algorithm for breast cancer diagn...
Performance enhancement of machine learning algorithm for breast cancer diagn...Performance enhancement of machine learning algorithm for breast cancer diagn...
Performance enhancement of machine learning algorithm for breast cancer diagn...
 
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfInvolute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
 
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfInstruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
 

IRJET- Hampering the Cloning Attacks in Online Social Networks

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3939 HAMPERING THE CLONING ATTACKS IN ONLINE SOCIAL NETWORKS S. SWETHA1, M. VAISHNAVI2, M. VIDHYA3 1,2,3, B.Tech, Department of information technology, Valliammai engineering college, Tamilnadu, India. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract – The millions of active users all around the world are using online social network such as Facebook, Twitter, Tumbler and LinkedIn. The usage of online social network make it effortless to misuse user’s information and to identity cloning attack to form fake profile .Fake users misusing the authorized users information’s like text, photos and videos with or without the authorized user’s permission. This paper is designed to provide security to the user images in social networks. Hence, in this paper, when users upload the profile picture or photos it would be watermarked and updated. Any fake users uploading the same profile picture can be detected and their respective IP would be tracked and blocked. Thus if any user account is find suspicious, an automated scanning is performed. So when the fake user’s login next time, an alert message would be sent to the account owner and the user activities would be closely monitored. If the account owner doesn’t respond the alert message the account would be suspended with prior information. And also when users uploading their images to the cloud computing platform, they lose direct control on these data, so users worry that their personal privacy information will be leaked and misused. In order to protect the user's personal privacy, before uploading images to the server, the image needs to be encrypted. The image will be encrypted by DWT image steganography method (hiding one image inside another image). This paper would be useful for preventing the cloning attacks. Keywords: cloning attack, watermarking, personal privacy, DWT, steganography 1. INTRODUCTION Social networks are becoming so essential now a days and plays a bigger role in every day’s life for sharing personal information’s and knowledge sharing. Also social network is used to see the everyday activities, photos, videos and political activities happening. The millions of active users all around the world are using online social network such as Facebook, Twitter, Tumbler and LinkedIn. Thus the major concern in social network is fake users misusing the authorized user information like text, photos and videos with or without the authorized user permission. Currently many fake profiles have been created for fraudulent activities like money making, malware / virus / Trojan virus distribution to track the user behaviour. Also a research states many fake Profiles have been created for online social games. In existing social network, the individual information’s are kept secret and transmitted in a secure manner with user privacy preserving. Thus even intruders have breached the privacy preserving in many scenarios. Thus many privacy attacks have been identified now a days to steal the user personal information for malicious activities. Thus this leads to a huge security problems. CNET report in the year 2013 states Facebook has 8.7% fake users which are approx. 83.09 million users. Thus in existing fake users are been difficult to be tracked. Thus if any user account is find suspicious, an automated scanning is performed. So when the fake user’s login next time, an alert message would be sent to the account owner and the user activities would be closely monitored. If the account owner doesn’t respond the alert message the account would be suspended with prior information 2. EXISTING SYSTEM In the existing system, there is no security for profile images and shared images and also existing system defines the encryption mechanism with the help of a trusted party. A social network user might choose to encrypt photos before posting in a platform by employing some encrypted mechanisms such as attribute-based encryption. The existing system use traffic analyzing and graph analyzing method which all are human monitoring method and not automatic. 2.1 DISADVANTAGES  No security for profile pictures. User profile pictures are misused for creating a fake profile.  There is no effective secure transmission of images. 3. PROPOSED SYSTEM In the proposed paper, Watermarking techniques will be used to detect and identify such fake profiles. In this method, at any time a user uploads his/her pictures, some exclusive and useful information such as email or username would be attached to pictures by means of watermarking methods. Accordingly, in future, if somebody else saves that picture and attempts to create a fake profile with stolen data, the system is able to automatically detect this deception as fraud and would prevent and protect the fake user from any additional positive action. Our proposed system invokes discrete wavelet transform algorithm for data hiding. Thus this would prevent the clone attacks and providing complete user data privacy preserving. For watermarking technique Java static watermarking is been used. Any fake users updating the same profile picture can be detected and
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3940 their respective IP would be tracked and blocked. Also this system provide secure authentication by invoked certain attributes which can be asked to the users during registration. Thus we can able to avoid clone attacks in social media networks. 3.1 ADVANTAGES  User identity are secured.  User can securely transmit the images from the user side to cloud and also share images using DWT based image steganography.  Clone attack is effectively prevented. 4. SYSTEM MODEL The Fig-1 explains the user activities such as sharing a image, uploading images to cloud. The admin can perform the actions such as authorization of the user, watermarking the image, verification, upload the steganographic images to the cloud storage. First the user has to register into the system. At the time of registration it will get all details and it will automatically obtain the IP address of the user. Then the user login in to the application and the admin checks whether the user is an authorized user and then permits the user to move on to the next level. The user will set the profile picture or sharing images to the application. It will automatically watermarked by his/her username in the image and uploaded in the system. Second step is that if any unknown user downloaded the image and after downloading he/she modify the image and try’s to upload in the system, it will validate the image. The validation is done by checking if there is any existence of watermark. If already any watermarking is in the image then an alert will send to the original user. Then the original user will decided whether to allow or not. If the original user will send a block message then the image cannot be uploaded. If the process has been repeated then the user IP will be blocked. Fig -1: ARCHITECTURE DIAGRAM When the user upload the images in the cloud, first the images will be secured by DWT steganography method that means hiding the original image inside the cover image and uploaded to the cloud. 5. MODULE DESCRIPTION 5.1 USER REGISTRATION The User wants to create an account and then only they are allowed to access the Application. Once the User creates an account, they can login to their account. All the user details will be stored in the database. During registration of the user, credentials like username, password, phone number and Email ID are obtained and also it will get the IP address. An application is designed for User Interface, Frame to Communicate with the Database through JDBC Coding using the programming Languages like Java.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3941 5.2 SHARING IMAGES The user can shared images or set profile pictures. The images will be watermarked and uploaded. A Static Watermark is a kind of marker covertly embedded in a noise-tolerant signal such as an audio, video or image data. It is typically used to identify ownership of the copyright of such signal. Watermarking is the process of hiding digital information in a carrier signal. In this method, at any time a user uploads his/her pictures, some exclusive and useful information such as email or username would be attached to pictures by means of watermarking methods. 5.3 ALERT AND BLOCK In this alert and block, system will automatically check the right and privilege of the user and ownership of uploaded file. Subsequently to checking the uploaded file, if the system finds the existence of watermark, it will send an announcement and a notification to the owner of original content and prevent user from re-uploading. Fake users updating the same profile picture can be detected and their respective IP would be tracked and blocked 5.4 DWT IMAGE STEGANOGRAPHY Image Steganography is the process of hiding an original image within the cover image and the extraction of it at its destination. Steganography is a technique of hiding an encrypted message so that no one suspects it exists. Dwt is a linear transformation operates on a data vector that separates data in to different frequency components. The wavelet transform separates the high frequency and low frequency information on a pixel. In this we were using Haar wavelet in this the low frequency wavelet coefficients will be obtained by averaging the two pixel values and the high frequency coefficients will be obtained by taking half of the difference of the two pixels. The obtained bands are Approximate band (LL), Vertical band(LH), Horizontal band(HL), Diagonal band(HH). 5.5 UPLOADING TO CLOUD The user can upload the images to the cloud in a secure manner. 6. CONCLUSION In this paper, cloning attack problem is studied. The proposed system provides result for providing security to the user profile images or shared images. An efficient watermarking algorithm is to provide security to the user images and to identify the fake users. Also, the fake profiles would be blocked in this system. The steganography is also used to provide security to the user images. The cloning attack across different social network can be prevented in future. ACKNOWLEDGEMENT We would like to thank our project guide Prof.Thenmozhi (Assistant Professor, Department of Information and Technology, Valliammai Engineering College), for their guidance throughout this project. We also like to thank our members of the department for their kind assistance and cooperation during the development of the project. 7. REFERENCES [1] Georges A.Kamhoua, Niki Pissinou, S.S.Iyengar, Jonathan Beltran, Charles Kamhoua, Brandon L Hernandez “Preventing Colluding Identity Clone Attacks in Online Social Networks”, IEEE 37th International conference on Distributed computing systems workshops, PP:187-192, 2017 [2] Mouro Conti, Radha Poovendran, Marco Secchiero “Fakebook: Detecting fake profiles in on-line social networks” IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, PP:1071-1078, 2012 [3] Po-Yueh Chen, Hung-Ju Lin “A DWT Based Approach For Image Steganography”, International Journal of Applied Science and Engineering, Volume:4 no: 3, 2006 [4] ] Chunyan Zhang, Jingbing Li, Shuangshuang Wang, Zhaohui Wang, “An encrypted medical image retrieval algorithm based on DWT-DCT frequency domain”, IEEE 15th international conference on software engineering research, management and applications(SERA),PP 135- 141,ISBN 978-1-5090-5756-6, 2017 [5] S.Priyanga, V.M.Priyadharshini, N.Hariharan “Prevention of Fake Profile Proliferatiion in Online Social Networks”, International Journal of Innovative Research in Science, Engineering and Technology, volume: 4, 2015.