Submit Search
Upload
Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Using User Pattern
•
0 likes
•
42 views
IRJET Journal
Follow
https://irjet.net/archives/V4/i3/IRJET-V4I3311.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 6
Download now
Download to read offline
Recommended
Authentication and Authorization for User Roles and Device for Attack Detecti...
Authentication and Authorization for User Roles and Device for Attack Detecti...
IRJET Journal
IRJET- Smartphone Sensor based Security Questions and Location
IRJET- Smartphone Sensor based Security Questions and Location
IRJET Journal
Engineering Project of Venkata Krishna
Engineering Project of Venkata Krishna
banda5630
Bk4301345349
Bk4301345349
IJERA Editor
Behavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison study
acijjournal
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET Journal
Vulnerabilities detection using attack recognition technique in multi-factor ...
Vulnerabilities detection using attack recognition technique in multi-factor ...
TELKOMNIKA JOURNAL
Kx3518741881
Kx3518741881
IJERA Editor
Recommended
Authentication and Authorization for User Roles and Device for Attack Detecti...
Authentication and Authorization for User Roles and Device for Attack Detecti...
IRJET Journal
IRJET- Smartphone Sensor based Security Questions and Location
IRJET- Smartphone Sensor based Security Questions and Location
IRJET Journal
Engineering Project of Venkata Krishna
Engineering Project of Venkata Krishna
banda5630
Bk4301345349
Bk4301345349
IJERA Editor
Behavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison study
acijjournal
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET Journal
Vulnerabilities detection using attack recognition technique in multi-factor ...
Vulnerabilities detection using attack recognition technique in multi-factor ...
TELKOMNIKA JOURNAL
Kx3518741881
Kx3518741881
IJERA Editor
Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management System
IJSRD
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
CSCJournals
Kg2417521755
Kg2417521755
IJERA Editor
DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade ...
DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade ...
1crore projects
Generic Authentication System
Generic Authentication System
IRJET Journal
M-Pass: Web Authentication Protocol
M-Pass: Web Authentication Protocol
IJERD Editor
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET Journal
Ijsrdv8 i10355
Ijsrdv8 i10355
aissmsblogs
Ijeee 51-57-preventing sql injection attacks in web application
Ijeee 51-57-preventing sql injection attacks in web application
Kumar Goud
Investigating the Combination of Text and Graphical Passwords for a more secu...
Investigating the Combination of Text and Graphical Passwords for a more secu...
IJNSA Journal
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
IJNSA Journal
Survey on cloud computing security techniques
Survey on cloud computing security techniques
eSAT Journals
Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...
eSAT Publishing House
Do4301690695
Do4301690695
IJERA Editor
Survey mobile app
Survey mobile app
eSAT Journals
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
IRJET Journal
SECURITY ANALYSIS ON PASSWORD AUTHENTICATION SYSTEM OF WEB PORTAL
SECURITY ANALYSIS ON PASSWORD AUTHENTICATION SYSTEM OF WEB PORTAL
cscpconf
Classification of Malware Attacks Using Machine Learning In Decision Tree
Classification of Malware Attacks Using Machine Learning In Decision Tree
CSCJournals
Design and development of non server peer 2 peer secure communication using j...
Design and development of non server peer 2 peer secure communication using j...
eSAT Publishing House
Single sign on mechanism for distributed computing
Single sign on mechanism for distributed computing
eSAT Publishing House
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTING
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTING
pharmaindexing
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IRJET Journal
More Related Content
What's hot
Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management System
IJSRD
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
CSCJournals
Kg2417521755
Kg2417521755
IJERA Editor
DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade ...
DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade ...
1crore projects
Generic Authentication System
Generic Authentication System
IRJET Journal
M-Pass: Web Authentication Protocol
M-Pass: Web Authentication Protocol
IJERD Editor
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET Journal
Ijsrdv8 i10355
Ijsrdv8 i10355
aissmsblogs
Ijeee 51-57-preventing sql injection attacks in web application
Ijeee 51-57-preventing sql injection attacks in web application
Kumar Goud
Investigating the Combination of Text and Graphical Passwords for a more secu...
Investigating the Combination of Text and Graphical Passwords for a more secu...
IJNSA Journal
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
IJNSA Journal
Survey on cloud computing security techniques
Survey on cloud computing security techniques
eSAT Journals
Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...
eSAT Publishing House
Do4301690695
Do4301690695
IJERA Editor
Survey mobile app
Survey mobile app
eSAT Journals
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
IRJET Journal
SECURITY ANALYSIS ON PASSWORD AUTHENTICATION SYSTEM OF WEB PORTAL
SECURITY ANALYSIS ON PASSWORD AUTHENTICATION SYSTEM OF WEB PORTAL
cscpconf
Classification of Malware Attacks Using Machine Learning In Decision Tree
Classification of Malware Attacks Using Machine Learning In Decision Tree
CSCJournals
Design and development of non server peer 2 peer secure communication using j...
Design and development of non server peer 2 peer secure communication using j...
eSAT Publishing House
Single sign on mechanism for distributed computing
Single sign on mechanism for distributed computing
eSAT Publishing House
What's hot
(20)
Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management System
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
Kg2417521755
Kg2417521755
DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade ...
DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade ...
Generic Authentication System
Generic Authentication System
M-Pass: Web Authentication Protocol
M-Pass: Web Authentication Protocol
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
Ijsrdv8 i10355
Ijsrdv8 i10355
Ijeee 51-57-preventing sql injection attacks in web application
Ijeee 51-57-preventing sql injection attacks in web application
Investigating the Combination of Text and Graphical Passwords for a more secu...
Investigating the Combination of Text and Graphical Passwords for a more secu...
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
Survey on cloud computing security techniques
Survey on cloud computing security techniques
Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...
Do4301690695
Do4301690695
Survey mobile app
Survey mobile app
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
SECURITY ANALYSIS ON PASSWORD AUTHENTICATION SYSTEM OF WEB PORTAL
SECURITY ANALYSIS ON PASSWORD AUTHENTICATION SYSTEM OF WEB PORTAL
Classification of Malware Attacks Using Machine Learning In Decision Tree
Classification of Malware Attacks Using Machine Learning In Decision Tree
Design and development of non server peer 2 peer secure communication using j...
Design and development of non server peer 2 peer secure communication using j...
Single sign on mechanism for distributed computing
Single sign on mechanism for distributed computing
Similar to Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Using User Pattern
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTING
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTING
pharmaindexing
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IRJET Journal
Graphical Password Authentication ppt.pptx
Graphical Password Authentication ppt.pptx
SarvaniShettigar
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
IRJET Journal
IRJET- Autobiographical Fallback Authentication using Smartphones
IRJET- Autobiographical Fallback Authentication using Smartphones
IRJET Journal
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
IRJET Journal
NDSS_submission_240
NDSS_submission_240
Sakshi Jain
Three Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern Security
ijtsrd
IRJET- Password Management Kit for Secure Authentication
IRJET- Password Management Kit for Secure Authentication
IRJET Journal
Graphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image Segmentation
IRJET Journal
Continuous User Identity Verification through Secure Login Session
Continuous User Identity Verification through Secure Login Session
IRJET Journal
Running head Project Plan .docx
Running head Project Plan .docx
toltonkendal
A Survey: Data Leakage Detection Techniques
A Survey: Data Leakage Detection Techniques
IJECEIAES
Women's Maltreatment Redressal System based on Machine Learning Techniques
Women's Maltreatment Redressal System based on Machine Learning Techniques
IRJET Journal
Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior
Editor IJCATR
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Peter Choi
IRJET- Fingerprint based Folder Lock
IRJET- Fingerprint based Folder Lock
IRJET Journal
Understandingphone sensor and app data for enhancing security
Understandingphone sensor and app data for enhancing security
Kamal Spring
Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management System
IJSRD
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniques
IAEME Publication
Similar to Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Using User Pattern
(20)
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTING
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTING
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
Graphical Password Authentication ppt.pptx
Graphical Password Authentication ppt.pptx
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
IRJET- Autobiographical Fallback Authentication using Smartphones
IRJET- Autobiographical Fallback Authentication using Smartphones
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
NDSS_submission_240
NDSS_submission_240
Three Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern Security
IRJET- Password Management Kit for Secure Authentication
IRJET- Password Management Kit for Secure Authentication
Graphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image Segmentation
Continuous User Identity Verification through Secure Login Session
Continuous User Identity Verification through Secure Login Session
Running head Project Plan .docx
Running head Project Plan .docx
A Survey: Data Leakage Detection Techniques
A Survey: Data Leakage Detection Techniques
Women's Maltreatment Redressal System based on Machine Learning Techniques
Women's Maltreatment Redressal System based on Machine Learning Techniques
Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
IRJET- Fingerprint based Folder Lock
IRJET- Fingerprint based Folder Lock
Understandingphone sensor and app data for enhancing security
Understandingphone sensor and app data for enhancing security
Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management System
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniques
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
Call Girls in Nagpur High Profile
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZTE
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
upamatechverse
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
RajaP95
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
SIVASHANKAR N
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Suman Mia
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
DeelipZope
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
rakeshbaidya232001
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
purnimasatapathy1234
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
GDSCAESB
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
null - The Open Security Community
Internship report on mechanical engineering
Internship report on mechanical engineering
malavadedarshan25
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
RajkumarAkumalla
Recently uploaded
(20)
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Internship report on mechanical engineering
Internship report on mechanical engineering
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Using User Pattern
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1320 SECRET LOCK – ANTI THEFT: INTEGRATION OF APP LOCKER & DETECTION OF THEFT USING USER PATTERN Kavitha.G1, KongaraDevipriya2, SivaSankari.S3, Deepa.J4 1Student, Department of Computer Science, Panimalar Institute of Technology, Chennai, Tamil Nadu 2 Student, Department of Computer Science, Panimalar Institute of Technology, Chennai, Tamil Nadu 3 Student, Department of Computer Science, Panimalar Institute of Technology, Chennai, Tamil Nadu 4Assistant Professor, Department of Computer Science, Panimalar Institute of Technology, Chennai, Tamil Nadu ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - This paper presents the various methods to secure or lock the mobile using user authentication. User will add multiple apps into our application for the secured access. At the time of registration, our application can frame a group of normal queries along with the user runtime verification as per the planned system. If the mobile is robbed, there's only a pair of choices, either to alter the SIM card or to hold identical SIM card and check out to use the apps. If SIM card is modified then naturally GPS, Voice recorder & Camera are initiated, so Location and Audio uplink are sent as SMS to the backup number of the user, and photograph is mailed. If he tries to use the private apps then system can question theuser with five random queries (three from traditional queriesanda pair of from user runtime pattern). If not licensed then camera, GPS & Voice recorder is initiated and sent to the first user to track. Key Words: Authentication,SIMcard,GPS,LocationTracing, Audio uplink, SMS, Runtime pattern, Track 1. INTRODUCTION Many net applications give secondary authentication strategies, i.e., secret queries (or parole recovery questions), to reset the account parole once a user’sloginfails.However, the answers to several such secret queries will be simply guessed by a colleague or exposed to a trespasser that has access to public on-line tools (e.g., on-line social networks); furthermore, a user could forget her/his answers long when making the private queries. Today’s prevalence of smartphones has granted us newopportunitiestowatchand perceive however the private knowledge collected by smartphone sensors and apps will ease to produce personalized secret queries without violating the users’ privacy concerns. This paper present a Secret-Question based Authentication system, known as “Secret-QA”, that makes a collection of secret queries on basic of people’s smartphone usage. We expand a model on Android smartphones, and evaluate the safety of the private queries by asking the acquaintance/intruder who participates inouruserstudyto guess the answers with and without the support of on-line tools; in the meantime, we observe the queries’ dependableness by asking participants to answer their own questions. Our experimental results affirm that the private queries associated with motion sensors, calendar, app instalment, and a part of legacy app usage history (e.g., phone calls) have the most effective memorability for users as well as the highest strength to attacks. This paper proposes a new approach to theft detection with the use of user patterns with a Global Positioning System (GPS) along with Short Message Service (SMS) properties which helps in tracking the snatched mobile. The method used is the SVM (Support Vector Machine) for User Identification property. 2. BACKGROUND AND RELATED WORK Cognitive passwordsarebasedonpersonal facts,interests and opinions that are probably to be simply recalled by a user and suggests their use as a method to overcome the dilemma of passwords that are either difficult to remember or that can easily be guessed. Passwords are selected by users, giving them a higher degree of recall than traditional system generated or user-selected passwords. User authentication through cognitive passwords is an extension of traditional password usage. It suggests the use of fact and opinion-based cognitive data, that is known only to theuser, as an authentication mechanism [1]. Recall and guessing rates for conventional, cognitive, and word association passwords were compared using 86 Massey University undergraduates. Respondents completed a questionnaire covering all three parole types,returningtwo weekslater for a recall test. Each respondent also nominated a “significant other” parent, partner, etc. who tried to predict the respondent’s answers. On average, cognitive items produced the highest recall rates (80%) but the guessing rate was also high (39.5%). Word associations produced low predicting rates (7%) but response words were poorly recalled (39%) Nevertheless, both cognitive items and word associations showed sufficient promise as password techniques to warrant further investigation [3]. They studywasa partial replication and extension of earlier research [7,8] on two such techniques, using cognitiveitemsandwordassociations. The cognitive items were similar to those used by Zviran and Haga [1].
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1321 Face-Cloak, a design that protects user privacy on a social networking site by shielding a user’s personal information from the site and from other users that weren't expressly authorized by the user. It improves usability and deploy- ability of solution [7]. A method of personalizing cognitive passwords to each user, to close this loophole, and check its performance against rigid cognitive passwords [8]. A framework for designing user authentication systems with challenge questions that includes privacy, security, and usability criteria for evaluating a candidate challenge- question system. The proposed challenge-question system for improving user credentials is based on this framework. User Identification and Recovery—are related to user authentication. Prior to obtaining a password or other credential for later account access, a user is typically identified by the account manager. The passwordsupportsa user’s further secure access. However, if a user loses or forgets his or her parole, there must be a form of user recovery, which could involve repetition of the original identification process. It offers a candidate framework for designing challenge-question systems, providing a classification for various question and answer types and discuss how they should meet certain privacy, security, and usability criteria [2]. Authentication mechanisms designed it to reduce vulnerability to statistical guessing attacks, responses could be penalized in proportion to their popularity. This could limit attackers to two or three popular answers [4]. Two such major factors are web browser and GPS services. Both of these functionalitiesarealreadyimplementedbutareonly in the hands of makers not in the hands of users due to proprietary problems, the system doesn’t allow the user to use the mobile hardware directly. From the available GIS processing tools in Android we can realize all three kinds of LBS services as a mobile can be configured as a server and for that we can also use the SQLite database [6]. We explored the Android Operating System (OS) and software development setting and evaluated several of its capabilities by constructing a working application. This application collected speedandlocationdata fromtheGlobal Positioning System (GPS) receiver, used the Google Maps Application Programming Interface (API). It combines both the GPS data and google search services [5]. A quasi- interferometric technique is formeasuringtheflighttimesof signals broadcast by global system for mobile communication [9]. Enabling end users to easily communicate sensitive data online was a significant milestone in the development of today’s net, and,arguably,a necessary condition for its explosive growth [10]. Such existing proposals serve as a good dawn of using one’s short-term activities to form secret queries as well as trying different question types. Since the smart phone has become one’s most indivisible device of recording his life, this paper presents a user authentication system Secret-QA to study on how one’s short-term history—almost all types of one’s activities wise to the smartphone—can benefit the safety and reliability of private queries and theft detection using user pattern. Meanwhile, we check the attack robustness of using a mixture of many lightweightquestions (true/false, multiple-choice) than using the blank-fillings,to strike a balanced trade-off between security (and/or reliability) and usability. 3. ARCHITECTURE The key design is hierarchy based structure that has been confirmed to be adept in app locker and theftdetection.This technique will take benefit of all ancient techniques for securing and protecting the mobile using many styles of paroles. During this system, to show that the private queries associated with motion sensors, last charged time, call log and additionally the queries based on gallery photos. We are implementing this application as phone theft detection and hindrance of necessary apps access. Furthermore, they’re high dependability and security and that they can easily track the mobile. Theycanautomatically start voice recorder and image capturing. The architecture of the proposed system is illustrated in figure 1 Fig-1: Architecture Diagram 3.1. METHODOLOGIES In Proposed system to enhance the performance of the app we use four methodologies like i) SVM (Support Vector Machine) ii) GPS (Global Positioning System) iii) SMS (Short Message Service) iv) E-mail i) SVM (Support Vector Machine) Support Vector Machine (SVM) is a directed machine learning algorithmic rule which might be used for both classification or regression challenges. However, it’s largely used in classification issues. During this algorithmicrule,we
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1322 plot each data item as a point in n-dimensional space(where n is number of features you have) with the worth of each feature being the value of a particular coordinate. Then, we do classification by finding the hyper-planethatseparate the two classes very well (look at the below snapshot). Fig-2: Support Vectors in SVM ii) GPS (Global Positioning System) GPS (Global Positioning System) is a network of orbiting satellites that send exact details of their position in space back to earth. The signals are obtained by GPS receivers,like navigation devices and are used to calculate the precise position, speed and time at the vehicles location. There are three components to a GPS system: a constellation of between 24 and 32 solar-powered satellites orbiting the earth in orbits at an altitude of roughly 20000 kilometers, a master control station and four control and monitoring stations (on Hawaii, Ascension Islands, Diego Garcia and Kawajale) and GPS receivers. A GPS receiver uses trilateration(a morecomplexversion of triangulation) to determine its position on the surface of the earth by timing signals from three satellites within the Global Positioning System. The GPS is a network of satellites that orbit the earth and send a signal to GPS receivers providing exact details of the receiver's location, the time of day, and also the speed the device is moving in connectionto the three satellites. Fig-3: Trilateration in GPS Each of the satellites is in an orbit that enables a receiver to detect a minimum of four of the operational satellites. The satellites send microwave signals to a receiver wherever the built-in computer usesthese signalstowork outyour precise distance from each of the four satellites and then triangulates your precisepositionontheplanettotheclosest few meters based on these distances. The Method of measuring the gap from satellite to GPS receiver is based on timed signals. iii) SMS (Short Message Service) SMS (Short Message Service) and also usually mentioned as a "text message". With a SMS, you’ll send a message of up to 160 characters to another device. Longer messages can automatically be separate into many parts. Most cell phones support this kind of text messaging. iv) E-mail Electronic mail, or email, is a technique of exchanging digital messages between people using digital devices like computers, tablets and mobile phones. 3.2. MODULES The design of the proposed system consisting of four modules based on the function accomplished: a) User Registration with Standard Questions b) Server c) Runtime Analysis d) Phone Theft Analysis a) User Registration with Standard Questions The Application Initial PagecontainstheUserRegistration method. We’ll produce the User Login Page by Button and Text Field Class in the Android.WhereasmakingtheAndroid Application, we have to style the page by dragging the tools like Button, Text field, and Radio Button. Once we designed the page we have to write down the codes for each class. Once we produce the complete mobile application, it’ll generated as Android Platform Kit (APK) file. This APK file are going to be put in within the User’s Mobile as an Application. Using this APK user are going to be registering with the server by adding alternative mobile number & Email ID. User’s IMSI number is additionally capturedbythe server and also register the standardquestionsandanswers.
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1323 Fig-4: Screenshot of Registration Page Fig-5: Screenshot of Registration Process Fig-6: Screenshot of 1st Static Question Fig-7: Screenshot of 2nd 3rd & 4th Static Questions b) Server The Server will communicate with their Mobile by GPRS (General Packet Radio Service) and GPS (Global Positioning System). User will be initially registering withtheserverand server can track the user with user’s IMSI (International Mobile Subscriber Identity) number. Server additionally preserve last activities of the mobile like last charge time, last call, etc., Fig-8: Screenshot of Runtime Process Fig-9: Screenshot of Pin Setting c) Runtime Analysis In this module, we will style the run time analysis. Once your mobile is snatched, sniper cangetaccesstoyourmobile and try to get access to your application. At the time, our application can raise some set of queries based on run time patterns. So, a sniper unable to answer the queries. Fig-10: Screenshot of Invalid Pin
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1324 Fig-11: Screenshot of 1st Question after Invalid Pin Fig-12: Screenshot of 2rd Question after Invalid Pin Fig-13: Screenshot of 4th Question after Invalid pin Fig-14: Screenshot of 5th Question after Invalid Pin d) Phone Theft Analysis In this module, we are going to produce phone theft analysis. At the time of registration, user register the standard queries. If the phone is snatched, camera is initiated and photo is taken so anonymous person is captured by the android application. This photo is uploaded to the main server. Once the photo is uploaded to the server, that link is captured and send as SMS alert to the alternate number of the first user. Apart from the photo capturing event anonymous person’s voice is also recorded for better recognition of that person. Once the audio is captured that file is sent as E-mail to the first user’s E-mail Id. Original user will transfer that audio file and might hear the voice of the anonymous person. Fig-15: Screenshot of SMS Alert to Alternate Number Fig-16: Screenshot of E-mail Alert to first user 4. RESULT In the flimsy, “UnderstandingSmartphone Sensorand App Data for Enhancing the Security of Secret Questions”present a Secret-Question based Authentication system, referred to as “Secret-QA”, We produce a group of queries based on the data associated with sensors and apps, that show the users’ short activities and smart phone usage. During this system, the private queries associated with motion sensors, last charged time and a part of legacy apps (call) have the most effective performance in terms of memorability and the attack resilience.
6.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1325 In our paper, “Secret Lock - Anti Theft: Integration of App Locker and Detection of Theft using User Patterns” we offer all the options afforded in ourbasepaperysimilarly our app can raise the private queries associatedwithmotion sensors, last charged time, call log and additionally the queries based on gallery photos. This App will help to improve the protection of secret queries without violating the users and make a group of queries based on the data related to sensors and apps, that show the users’ short activities and smart phone usage except this the most thought concerned is 1. ANTI THEFT, the process of pursuing our mobile once it’s being snatched by someone. 2. It simply captures the image in addition to it can record the voice of the one that ever try and use the data that is locked by thisapp.Apartfromrecording and taking the image, it will simply transfer it within the server and send the link to the E-mail id and to the alternate number. Hereby, it’s very clear that this paper has several advanced features than the opposite papers and it provides higher performance and have a most chance to catchthesniperand it helps the mobile user to feel secured and preserve their own privacy. 5. CONCLUSION In this paper, we tend to commenced a Secret-Question based Authentication system, known as “Secret-QA”, and conduct a user study to grasp what proportion the private knowledge collected by smart phone sensors and apps will help in improving the safety of secret queries without violating the users’ privacy. We produce a group of queries based on the data associated with sensors and apps, that show the users’ short activities and smart phone usage. We tend to measure the dependability of those queriesbyasking participants to answer these question, furthermore as launching the acquaintance/stranger guessing attacks with and without the help of on-line tools, and that we are considering establishing a probabilistic model based on a large scale of user knowledge to characterize the safety of the private queries In our experiment, the set of secret queries which are associated with motion sensors, last charged time, call log and additionally the queries based on gallery photos have the best performance in terms of memorability and the attack resilience, which outplaythe conventional secret-question based approaches that are created based on a user’s long history/information. 6. FUTURE ENHANCEMENT In the future system, Android Application is developed within which user’s Hand Waving Pattern is recorded & continual the above action for more times until the Application registers user’s Pattern. REFERENCES [1] M. Zviran and W. J. Haga, “User authentication by cognitive passwords: an empirical assessment,” in Information Technology, 1990.’Next Decade in Information Technology’, Proceedings of the 5th Jerusalem Conference on (Cat. No. 90TH0326-9). IEEE, 1990, pp. 137–144. [2] M. Just, “Designing and Evaluating Challenge-Question Systems” in IEEE Security & Privacy, IEEE, 2004, pp. 32- 39. [3] J. Podd, J. Bunnell, and R. Henderson, “Cost-effective computer security: Cognitive and associative passwords,” in Computer-Human Interaction, 1996. Proceedings., Sixth Australian Conference on. IEEE, 1996, pp. 304–305. [4] S. Schechter, A. B. Brush, and S. Egelman, “It’s no secret. measuring the security and reliability of authentication via secret questions,” in S & P., IEEE. IEEE, 2009, pp. 375–390. [5] J. Whipple, W. Arensman, and M. S. Boler, “A public safety application of GPS-enabled smartphones and the android operating system,” in Proc. IEEE Int. Conf. Syst., Man Cybernet., 2009, pp. 2059–2061. [6] S. Kumar, M. A. Qadeer, and A. Gupta, “Location based services using android (lbsoid),” in Proc. IEEE Int. Conf. Internet Multimedia Services Ar chit. Appl.,2009,pp.1– 5. [7] W. Luo, Q. Xie, and U. Hengartner, “Face Cloak: An architecture for user privacyonsocial networkingsites,” in Proc. Int Conf. Computer. Sci. Eng., IEEE, 2009, vol. 3, pp. 26–33. [8] Liar Lazaro, Omer Tsiolkovsky, Chanan Glezer, Moshe Zviran, “Personalized cognitive passwords: an exploratory assessment”, in InformationManagement& Computer Security, Vol. 19 No. 1, 2011 pp. 25-41. [9] R. Faragher and P. Duffett-Smith, “Measurements of the effects of multipath interference on timing accuracyina cellular radiopositioningsystem,”Radar,SonarNavigat., IET, vol. 4, no. 6, pp. 818–824, Dec. 2010. [10] J. Clark and P. van Oorschot, “Soc: Ssl and https: Revisiting past challenges and evaluating certificate trust model enhancements,” in Proc. IEEE Symp. Security Privacy, May 2013, pp. 511–525.
Download now