Submit Search
Upload
IRJET-PLC and SCADA based Distribution and Substation Automation
•
0 likes
•
28 views
IRJET Journal
Follow
https://www.irjet.net/archives/V5/i3/IRJET-V5I379.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 6
Download now
Download to read offline
Recommended
Enhancing Web-Security with Stronger Captchas
Enhancing Web-Security with Stronger Captchas
Editor IJCATR
Captcha a security measure against spam attacks
Captcha a security measure against spam attacks
eSAT Journals
Captcha Seminar report 2014 pdf
Captcha Seminar report 2014 pdf
Ganesh Dhage
Advanced Captcha Report
Advanced Captcha Report
Arpit Gupta
Captcha seminar report
Captcha seminar report
Rishabh Agarwal
Captcha Seminar report 2014
Captcha Seminar report 2014
Ganesh Dhage
A SURVEY ON CAPTCHA TECHNIQUE BASED ON DRAG AND DROP MOUSE ACTION
A SURVEY ON CAPTCHA TECHNIQUE BASED ON DRAG AND DROP MOUSE ACTION
International Journal of Technical Research & Application
Captcha report
Captcha report
RAJ SINGH MANDY
Recommended
Enhancing Web-Security with Stronger Captchas
Enhancing Web-Security with Stronger Captchas
Editor IJCATR
Captcha a security measure against spam attacks
Captcha a security measure against spam attacks
eSAT Journals
Captcha Seminar report 2014 pdf
Captcha Seminar report 2014 pdf
Ganesh Dhage
Advanced Captcha Report
Advanced Captcha Report
Arpit Gupta
Captcha seminar report
Captcha seminar report
Rishabh Agarwal
Captcha Seminar report 2014
Captcha Seminar report 2014
Ganesh Dhage
A SURVEY ON CAPTCHA TECHNIQUE BASED ON DRAG AND DROP MOUSE ACTION
A SURVEY ON CAPTCHA TECHNIQUE BASED ON DRAG AND DROP MOUSE ACTION
International Journal of Technical Research & Application
Captcha report
Captcha report
RAJ SINGH MANDY
Captcha
Captcha
Vruti Surani
CAPTCHA(Image Verification Code)
CAPTCHA(Image Verification Code)
Abhimanyu Sood
CAPTCHA- Newly Attractive Presentation for Youth
CAPTCHA- Newly Attractive Presentation for Youth
WebCrazyLabs
Seminar report on captcha
Seminar report on captcha
kunalkiit
Captcha ppt
Captcha ppt
Abhishek Anand
Image authentication for secure login
Image authentication for secure login
IRJET Journal
captcha.ppt
captcha.ppt
avinash2008
289 292
289 292
Editor IJARCET
Research trends on CAPTCHA: A systematic literature
Research trends on CAPTCHA: A systematic literature
IJECEIAES
Captchas
Captchas
NIKHIL NAIR
Captcha1
Captcha1
Ashish Madhok
Captcha seminar
Captcha seminar
Aurobindo Nayak
Captcha by vinit sharma
Captcha by vinit sharma
vinit1991
From Captchas to Captchæckers: Can we automate usability and security evalua...
From Captchas to Captchæckers: Can we automate usability and security evalua...
Shujun Li
Captcha
Captcha
Sumit Garg
A countermeasure for security intensification in cloud using CaPGP
A countermeasure for security intensification in cloud using CaPGP
IRJET Journal
Captchas
Captchas
Shashwat Shriparv
Evolution of captcha technologies
Evolution of captcha technologies
Monika Keerthi
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
IJCSIS Research Publications
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...
ijiert bestjournal
Captcha system
Captcha system
Kanchan Dixit
IRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using Passmatrix
IRJET Journal
More Related Content
What's hot
Captcha
Captcha
Vruti Surani
CAPTCHA(Image Verification Code)
CAPTCHA(Image Verification Code)
Abhimanyu Sood
CAPTCHA- Newly Attractive Presentation for Youth
CAPTCHA- Newly Attractive Presentation for Youth
WebCrazyLabs
Seminar report on captcha
Seminar report on captcha
kunalkiit
Captcha ppt
Captcha ppt
Abhishek Anand
Image authentication for secure login
Image authentication for secure login
IRJET Journal
captcha.ppt
captcha.ppt
avinash2008
289 292
289 292
Editor IJARCET
Research trends on CAPTCHA: A systematic literature
Research trends on CAPTCHA: A systematic literature
IJECEIAES
Captchas
Captchas
NIKHIL NAIR
Captcha1
Captcha1
Ashish Madhok
Captcha seminar
Captcha seminar
Aurobindo Nayak
Captcha by vinit sharma
Captcha by vinit sharma
vinit1991
From Captchas to Captchæckers: Can we automate usability and security evalua...
From Captchas to Captchæckers: Can we automate usability and security evalua...
Shujun Li
Captcha
Captcha
Sumit Garg
A countermeasure for security intensification in cloud using CaPGP
A countermeasure for security intensification in cloud using CaPGP
IRJET Journal
Captchas
Captchas
Shashwat Shriparv
Evolution of captcha technologies
Evolution of captcha technologies
Monika Keerthi
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
IJCSIS Research Publications
What's hot
(19)
Captcha
Captcha
CAPTCHA(Image Verification Code)
CAPTCHA(Image Verification Code)
CAPTCHA- Newly Attractive Presentation for Youth
CAPTCHA- Newly Attractive Presentation for Youth
Seminar report on captcha
Seminar report on captcha
Captcha ppt
Captcha ppt
Image authentication for secure login
Image authentication for secure login
captcha.ppt
captcha.ppt
289 292
289 292
Research trends on CAPTCHA: A systematic literature
Research trends on CAPTCHA: A systematic literature
Captchas
Captchas
Captcha1
Captcha1
Captcha seminar
Captcha seminar
Captcha by vinit sharma
Captcha by vinit sharma
From Captchas to Captchæckers: Can we automate usability and security evalua...
From Captchas to Captchæckers: Can we automate usability and security evalua...
Captcha
Captcha
A countermeasure for security intensification in cloud using CaPGP
A countermeasure for security intensification in cloud using CaPGP
Captchas
Captchas
Evolution of captcha technologies
Evolution of captcha technologies
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Similar to IRJET-PLC and SCADA based Distribution and Substation Automation
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...
ijiert bestjournal
Captcha system
Captcha system
Kanchan Dixit
IRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using Passmatrix
IRJET Journal
A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...
A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...
IRJET Journal
IRJET- Different Implemented Captchas and Breaking Methods
IRJET- Different Implemented Captchas and Breaking Methods
IRJET Journal
A FRAMEWORK FOR DEVANAGARI SCRIPT-BASED CAPTCHA
A FRAMEWORK FOR DEVANAGARI SCRIPT-BASED CAPTCHA
ijait
289 292
289 292
Editor IJARCET
Demonstrated Deep Learning Techniques for the Resolution of CAPTCHA images
Demonstrated Deep Learning Techniques for the Resolution of CAPTCHA images
IRJET Journal
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
IOSR Journals
Research Paper on Android Graphical Image Password
Research Paper on Android Graphical Image Password
ijtsrd
Generic Authentication System
Generic Authentication System
IRJET Journal
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET Journal
Enhancing The Human Perceivable Image Content In CAPTCHA Based BF Algorithm
Enhancing The Human Perceivable Image Content In CAPTCHA Based BF Algorithm
theijes
DE REPORT ON CAPTCHA CODE FOR CSE B.TECH STUDENTS
DE REPORT ON CAPTCHA CODE FOR CSE B.TECH STUDENTS
PINKESH PATEL
IRJET- Carp a Graphical Password: Enhancing Security using AI
IRJET- Carp a Graphical Password: Enhancing Security using AI
IRJET Journal
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET Journal
IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET Journal
A Survey of Current Research on CAPTCHA
A Survey of Current Research on CAPTCHA
IJCSES Journal
Captcha Recognition and Robustness Measurement using Image Processing Techniques
Captcha Recognition and Robustness Measurement using Image Processing Techniques
IOSR Journals
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
cscpconf
Similar to IRJET-PLC and SCADA based Distribution and Substation Automation
(20)
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...
Captcha system
Captcha system
IRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using Passmatrix
A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...
A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...
IRJET- Different Implemented Captchas and Breaking Methods
IRJET- Different Implemented Captchas and Breaking Methods
A FRAMEWORK FOR DEVANAGARI SCRIPT-BASED CAPTCHA
A FRAMEWORK FOR DEVANAGARI SCRIPT-BASED CAPTCHA
289 292
289 292
Demonstrated Deep Learning Techniques for the Resolution of CAPTCHA images
Demonstrated Deep Learning Techniques for the Resolution of CAPTCHA images
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Research Paper on Android Graphical Image Password
Research Paper on Android Graphical Image Password
Generic Authentication System
Generic Authentication System
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
Enhancing The Human Perceivable Image Content In CAPTCHA Based BF Algorithm
Enhancing The Human Perceivable Image Content In CAPTCHA Based BF Algorithm
DE REPORT ON CAPTCHA CODE FOR CSE B.TECH STUDENTS
DE REPORT ON CAPTCHA CODE FOR CSE B.TECH STUDENTS
IRJET- Carp a Graphical Password: Enhancing Security using AI
IRJET- Carp a Graphical Password: Enhancing Security using AI
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET- A Shoulder-Surfing Resistant Graphical Password System
A Survey of Current Research on CAPTCHA
A Survey of Current Research on CAPTCHA
Captcha Recognition and Robustness Measurement using Image Processing Techniques
Captcha Recognition and Robustness Measurement using Image Processing Techniques
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
purnimasatapathy1234
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
abhishek36461
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
eptoze12
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
Asst.prof M.Gokilavani
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
k795866
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
KartikeyaDwivedi3
Internship report on mechanical engineering
Internship report on mechanical engineering
malavadedarshan25
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
me23b1001
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
VICTOR MAESTRE RAMIREZ
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
misbanausheenparvam
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
Asst.prof M.Gokilavani
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes examples
Dr. Gudipudi Nageswara Rao
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting .
Satyam Kumar
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
PoojaBan
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Dr.Costas Sachpazis
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
959SahilShah
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
DeelipZope
Recently uploaded
(20)
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
Internship report on mechanical engineering
Internship report on mechanical engineering
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes examples
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting .
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
IRJET-PLC and SCADA based Distribution and Substation Automation
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 128 Video Captcha as a Graphical Password Pooja Kute1, Tejaswini Lokhande2, Manasi Kanadi3, Sayali Kashid4, Ruchira Deshmukh5 1,2,3,4,5 Student, Department of Computer Engineering, PC Polytechnic , Pune ,India 5Lecturer, Department of Computer Engineering, PC Polytechnic, Pune, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - The internet has been enjoying associate more and more vital role in our way of life, with the supply of the many web services comparable to email and search engines. CAPTCHA (Completely machine driven Public Turing take a look at to inform Computers and Humans Apart) was developed to tell apart between pc programs andhumanusers that was initialized in 1997 and was developed in 2000.The development of CAPTCHA system is to supply artistic and validation tests that may be simply resolved by humans and tough for robot. There area unit four forms of strategies in development CAPTCHA that is that the text primarily based CAPTCHA, CAPTCHA supported image, CAPTCHA based audio and video {based mostly primarily based} CAPTCHA .Thistype of CAPTCHA had developed by mistreatment markup language, JavaScript / J question and Cascading vogue Sheets (CSS).Every CAPTCHA have its own techniques to supply security.. This paper presents a survey of Optical Character Recognition applications and more focuses on 3 important applications of Optical Character Recognition. Key Words: Captcha, Video Captcha,CaRP. 1 .INTRODUCTION The internet contributes profoundly too many aspects of human life such as communications, Education and online commercial activities etc. Some web services have online registration where the usersprovide informationinorderto connect and use services such as email in Yahoo, Gmail and Hotmail. However, many programs have been developed by hackers which automatically complete website registration pages with incorrect information which can cause traffic congestion, minimizing the performanceofthesystemandin some cases, even causing it to fail, particularly where a website has a huge number of accounts. Therefore, researchers developed a mechanism to distinguish between human users and computer programs in the case of online registration. The standard mechanism used currently to address this issue is CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart). The concept of CAPTCHA is based on the abilityofhumansto do certain tasks which computer programs cannot, such as asking users to type a distorted text image or choose a particular picture from many displayed pictures. In recent years, many types of CAPTCHAs have been developed. Some are based on Optical Character Recognition (OCR) such as text CAPTCHA, whereas others are based on Non-Optical Character Recognition (Non-OCR) which uses multimedia, such as voice and video. Some of these types of CAPTCHAs have been broken by new bot programs. For example, a text CAPTCHA can be broken by using the mechanism of segmentation letters. This paper will describe the newtypes of CAPTCHAs proposed in recent published papers,describe their classifications, comparing between CAPTCHAbasedon weakness and strength of them. To avoidaboveproblemswe are introducing the concept to achieve new security primitive called Click based video Captcha which avoids the OCR problem asuser is presented with video and asktoclick on any point at any time on any instant and the RGB points, xyz axis and current time is taken and the same video is provided to user next time and asked to click on the same points clicked earlier and if the user clicks the same point authentication is done and if the points clicked does not matched with the old points authentication is failed. We understand the complexity of exact point clicking so we are using +10 and -10 points around the pixel point clicked[1],[2],[3],[5],[8],[7],[10],[12],[15]. 1.1 Literature Survey 1996 Moni Noar steered the utilization of an automatic Turing check to differentiate between humanusersandbots. 1997 Andrei Broder et al. developed a mechanism to differentiate between human users and pc programs and additionally within the same year, the Altavista web site used this methodology to dam larva programs from getting into by displaying a distorted English word to the user and asking the user to repeat it 2002 Broder declared that a CAPTCHA system had been in situ for over year that had reduced the quantity of spam advertising URLs by over ninety fifth 2000 term CAPTCHA was coined by the team junction rectifier by Manuel Blum and Luis von Ahn at Carnegie Mellon University 2003 Barid and Monica Chew from Golden State designed the Baffle text CAPTCHA 2004 the Yahoo web site used an easy version of the EZ-Gimpy methodology Isoroku Yamamoto, Tygar & Nishigaki designed a Strangeness in Sentences CAPTHCA. This methodology relies on the flexibility of humans to differentiate natural sentences created by humans from machine-translated sentences. Thepcshowstheuserseveral sentences that are a mix of natural and machine-translated sentences and asks the user to pick out the one that is formed by a personality's. Each natural sentences (NS) created by humans and therefore the Non-Grammatical sentences (NG) created by a MT program are collected by this methodology. NS are collected from paper media love newspapers, magazines and books that is healthier than extracting them from the net as a result of automatic programs will simply hunt for sentences on the net and utilize them within the SS-CAPTCHAwhenrecognizingthem,
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 129 whereas Non-Grammatical is created by translating natural sentences from a non-mother-tongue into a mother-tongue language victimization machine-translation programs This approach needs the user to be good within the Englishandis so not appropriate for non-English speakers. The Pic CAPTCHA uses an oversized info pictures} and animated images of everyday objects love dogs, flowersetc.Theuseris shown four completely different photos of identical object and is needed to a word to point the item or thought to that all pictures belong. Bin B. Zhu enforced the Captcha as Graphical arcanums-A New Security Primitive supported exhausting AI Problems. This authenticationsystemrelieson Animal Grid and click on text which might be employed in smartphone still as desktop computers. HosseinNejati enforced the DeepCAPTCHA: a picture CAPTCHA supported Depth Perception. During this system half-dozen pictures totally different of various} objects and different sizes of pictures is employed and user task isto order these pictures in terms of their relative size. Hadyn Ellis enforced the Science behind Pass faces. during this system 3x3 grid is employed. User conjointly uses the human faces or a numerical input device worth this worth is corresponds to the faces on the grid. In this a minimum of three to seven faces user ought to choose for loginmethod.Howeverduring this system needed login time are often increased if user selects additional passfaces.P. R. Devale enforced Cued Click Points with Click Draw primarily based Graphical Password. During this system increasing security victimization secret drawing especially imagethroughoutauthenticationprocess. Correct Arcanum or incorrect Arcanum is displayed once final click. Pankaja Patil enforced Graphical password authentication victimization persuasive cued click purpose. During this system once filling the shape user will choose user define image or system outline image at that time user ought to click any pixels within the picturesas click purpose to form graphical arcanum. Throughout creationofarcanum one read port that's willy-nilly positioned on theimage User conjointly change this read port if user doesn't need that read port. Read port are often modified victimizationShuffle. Throughout registration phase user has got to click five purpose at intervals that read port and at a login time sequence should be in correct order If the user is not registered then user has to create an account by giving username and password. And according to that password, user will get a new Captcha challenge every time. By clicking on correct points user can login. Then Authenticated server receives password of particular account and calculate its hash value using algorithm like SHA-1. Authentication is successful if and only if thetwohashvalues are matched. [1],[2],[3],[4],[5],[8],[7],[10],[12],[14][15]. 1.2 Existing System The invention of CAPTCHA could be a terribly notable primitive. It distinguishes human users from computers by presenting challenges .In it had been introduced to use each CAPTCHA and secret during a user authentication protocol. This can be referred to as CAPTCHA–based secret Authentication (CbPA). CbPA counterson-linelexiconattack. Specifies finding CAPTCHA challenge when coming into a legitimate try of user id and secret unless valid browser cookies received. If invalid browser cookie is received the user has sure immovableness to unravelCAPTCHAchallenge before being had to derive access. AN improvisation on CbPA-protocols propose ring states that only if the amount off ailed login tries for the account exceeds a threshold a CAPTCHA are applied and storing cookies solely on user- sure machines. any improved in, atiny low threshold is applied for unsuccessful login triesfrom unknownmachines however an oversized threshold for unsuccessful tries from machines with previous prospering logins among given timeframe. Recognition primarilybasedgraphicalpasswords were additionally utilized in, wherever text captcha is displayed below every image. User locateshis/her own pass – pictures and enters the characters at specific location of captcha below even for every pass image those specific very pass-image ashis / her secret throughout authenticationfor every pass image those specific locations were designated throughout secret creation as a part of the secret[2],[3],[5],[6],[10]. 1.3 Proposed System CaRP is each a Captcha and a graphical Arcanum theme. CaRP addresses variety of security issues altogether, such as on-line idea attacks, relay attacks, and,ifcombinedwithdual- view technologies, shoulder-surfing attacks. Our graphical Arcanum system relies on text password and graphical Arcanum. For made login user has to choose correct image that is chosen by user throughout a registration. 1.4 Proposed Architecture In the design diagram we've got shown our application flow that however our application works i.e.onceuseropens the online application and tries to login we've got enforced varied existing Captcha’s aswell asour planned captcha. the prevailing Captcha includes audio captcha, text captcha, numbers captcha, character captcha, etc. we tend to square measure attending to develop a ecommerce looking portal
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 130 wherever the user has got to login and proceed more for looking, if the user buys a product it's additional to the go- cart wherever the user will go and checkout to payment entrance, once the user is doing payment we've gotenforced our Video-based click captcha to supply the protection supported AI wherever the user is shown a video and raise to click on the video at any purpose to any instance, to the backend we tend to collect the x,y,z axispurposesand RGB’s at the side of the time of instance and therefore the users clicks on submit button wherever he's once more asked to click on identical video on identical point if the points matches the user is processed utterly and if not the user is once more directed to payment entrance 1.1 Architecture Diagram 1.5 Comparison between Existing System and Proposed System Existing System Proposed System 1.The Existing captcha is develop in 1997 1 .We have to develop Video clicked based captchain2018. 2. In existing system picture based authentication is designed to authenticate into the system. 2. we are introducing the concept to achieve new security primitive called Click based video captcha 1.5 Scope of Project CAPTCHA playsvital role in World Wide internetsecurity wherever it prevents larva programs and Hackers from abusing on-line services. This paper has conferred ideasand history of CAPTCHAs, and mentioned theirapplications.This paper describing classification of current CAPTCHA strategies supported text, images, voice, video and puzzle.In every classify there square measure many varied strategies hasintroduced and mentioned and to avoid the all captcha’s weakness that is caused by bots and OCR machines by introducing the new security primitiveknown asclickbased mostly video captcha. 1.6 Technical requirement H/W System Configuration: Processor Pentium –III Speed 1.1 GHz RAM 256 MB(min) Hard Disk 20 GB Key Board Standard Windows Keyboard Mouse Two or Three Button Mouse Monitor SVGA S/W System Configuration: Operating System Windows95/98/2000/XP Application Server Tomcat5.0/6.0x Scripts Java Script. Server side Script Java Server Pages. Database Mysql Database Connectivity JDBC Front End HTML, Java, Jsp 2 WORKING METHODLOGY In CAPTCHA as a graphical passwords system there are a unit four types or ways of CAPTCHAs enforced as follows are: 1. Text CAPTCHAs 2. Image CAPTCHAs 3. Audio CAPTCHAs 4. Video CAPTCHAs [2], [5]. 2.1 Text CAPTCHAs Text CAPTCHAs square measure at random generated. These text CAPTCHAs square measure presented the user throughout the language up process. These text CAPTCHAs distinguishes humans from bots [2], [5].
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 131 2.1 Text CAPTCHAs 2.2 Audio CAPTCHAs Audio CAPTCHAs square measure second technique enforced within the system. Throughout the user sign on method, user is given audio CAPCTHAsthat are generatedat random. User has to hear it and sort it because it is to sign on. This again distinguishes humans from bots [2],[5]. 2.2 Audio CAPTCHAs 2.3 Image CAPTCHAs A method referred to as Cued Clicked Points (CCP) is enforced under the image recognition primarily based CAPTCHAs. Here the user will be given pictures, amongst that he has got to choose one and build 5 clicks anyplace on the image. These clicks are saved as parole [2], [5] 2.3 Image CAPTCHAs 2.4 Video CAPTCHAs Video CAPTCHAs are one more technique within the CAPTCHA system. Here during this methodology a video is Provided to the user throughout linguistic communication up method. There will be few queries displayed for user to answer based on the video. If the answers matches to the answers hold on within the info user signs up successfully[2],[5]. 2.4 Video CAPTCHAs 3 SECURITY ANALYSIS The simple captcha security analysis were case by case or on approximation primarily based. There’s no such conjectural security model nonetheless established. A captcha challenge usually consistof6-10charactershowever in CaRP there are a unit thirty or a lot of characters. The quality to interrupt a Click-Text image is about α30 P(N)/(α10P(N)) = α20 times the complexity to break a CAPTCHA challenge generated by its underlying CAPTCHA scheme. As CaRP system area unit organized in 2 dimensions, segmentation becomes troublesome and sophisticated. Hence, it reduces distortion in generated pictures rising usability [4], [7]. 3.1 On-line shot Attack In automatic on-line shot attacks, dictionaries square measure created manually by trial and error method. If negligible chance is ignored, object on one among the generated image square measure computationally- independent from another generated image in CaRP. Trials in shot attacks are reciprocally independent [4], [7]. 3.2 Human shot Attack In human shot attacks, passwordssquaremeasureentered by humans by trial and error method. Humans shot method is much slower than computers. In straightforward captcha there square measure only eight charactershoweverinCaRP there square measure around thirty three characters. In Click Text that makes additional complications for humans to track positiveidentification. If we tend to assume
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 132 that a thousand individual’s square measure used to work eight hours per day with none stop during a human guessing attack, which all and sundry takes thirty seconds to finish one trial[4],[7]. 3.3 Relay Attack Relay attacks square measure enforced in many ways in which. Considering captcha challenges on websites to be hacked, one way of attack is to possess human surfers solve the challenges continue aquaticsthe web site the tactic used for determination CaRP is completely differentfromcaptcha challenge that makes person very tough to crack thepositive identification. Even the input from user is uselessfor testing positive identification guess in CaRP [4],[7]. 3.4 Shoulder-smurfing Attack Shoulder-surfing attacks is mostly determined once Graphical passwords square measure entered publically place reminiscent of bank ATM. CaRP isn't sturdy however combined with dual-view technology will be thwart shoulder-surfing attacks [4], [7]. 3.5 Advantage Avoids OCR attacks and prevent system from bots. Unbreakable captcha by machine attacks Due to its movable nature. Click points introduces external object moving i.e. mouse which is not possible for machine. 3.6 Disadvantage User complexity. 4 CONCLUSION This paper explains construct of victimization CAPTCHA asgraphical passwords. Security primitivesbecauseofthatit becomes necessary to develop systems like graphical passwords which square measure exhausting to crack and square measure safer than the traditional passwords. However this technique prevents attacks made by bots.CAPTCHA plays vital role in World Wide net security wherever it prevents larva programs and Hackers from abusing on-line services. This paper has conferred ideasand history of CAPTCHAs, and mentioned their applications .Hence we've got introduced Associate in Nursing new click based mostly video captcha that resolvesall the weaknessof the opposite existing captcha and makes the system or net world free from larva attack [2], [6],[ 15]. ACKNOWLEDGEMENT I would prefer to specific my profound feeling and deep regard to my Project Guide Mrs. Ruchira Deshmukh, for his exemplary counsel, valuable feedback and constant positive stimulus throughout the period of the project. His suggestions were of Brobdingn agian facilitate throughout my project work. Working beneath him was an especially knowledgeable experience on behalf of me[5]. REFERENCES [1] Sonali S. Pawar , Prof. Pravin P. Kalyankar, Graphical password scheme: CAPTCHA, International Journal of Engineering Research and General Science Volume 4, Issue 1, January-February, 2016. [2] Priyanka J. Charde, Prof. M. S. Khandare, Review paper on improved security using captcha as graphical password, 2016 IJSRSET | Volume 2 | Issue 2. [3] Kurt Alfred Kluever, Richard Zanibbi, Balancing Usability and Security in a Video CAPTCHA, IJREAT Volume 4, Issue 3, Jan-May, 2012. [4] R.SARANYA ,S.USHA,S.VIGNESWARI,M.VIDHYAA,Image and audio based authentication using captcha as graphical password, (IJARTET)Vol. 3, Special Issue 16, March 2016. [5] Shraddha S. Banne, Prof. Kishor N. Shedge, CARP: CAPTCHA as a graphical password based authentication scheme, IJARCCE Vol. 5, Issue 1, January 2016. [6] Mrs. A.Angel Freeda, M.Sindhuja, K.Sujitha, Image captcha based authentication using visual cryptography IJREAT Volume 1, Issue 2, April-May, 2013. [7] Sharwari Parade, Rujuta Pachpande,SupriyaDeshmukh, Stuti Ahuja, Captcha as graphical password, (IRJET) Volume: 03 Issue: 04 | Apr-2016. [8] Mr.Sagar Kambale,Mr.PramodKamble,Mr.Yogesh Dhavan, Ms.Dipali Mahajan, MsRenuka Jadhav, CAPTCHA as graphical passwords, (IRJET) Volume: 03 Issue: 05 | May-2016. [9] Pranal Tayade, Prof. Mahip Bartere, two way authentication for web servicesusing video captchaand Kerberos, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 3, Issue 4, April 2015. [10] Prof. Anisaara Nadaph, Juwairiya Shaikh, Nikita Bodhe , Hemlata Pingale, Mrunali khunte, Video CAPTCHA – design based on moving object recognition, International Journal of Innovative Research in Computer and Communication Engineering,Vol.4,Issue 4, April 2016.
6.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 133 [11] Kurt Alfred Kluever, Richard Zanibbi, Video CAPTCHAs: usability vs. security, September 26, 2008. [12] Kameswara Raoa, Kavya Sria ,Gnana Saia, A novel video CAPTCHA technique to prevent BOT attacks, Procedia Computer Science 85 (2016 ) 236 – 240. [13] Jing Song Cui, LiJing Wang, Jing Ting Mei, Da Zhang, Xia Wang, Yang Peng, Wu Zhou Zhang, CAPTCHA design based on moving object recognition problem, Vol. 4, Issue 4, May 2013. [14] Pawar S.E, Bauskar Makarand, Captcha: a security measure against spam attacks, IJRET ISSN: 2319-1163. [15] Ms. Mira K. Sadar, Mr. Pritish A.Tijare, Mr. Swapnil N. Sawalkar, Review on captcha: graphical password for security, International Journal of Research in Advent Technology, Vol.3, No.1, January 2015 E-ISSN: 2321- 9637.
Download now