Captcha and graphical passwords are internet security techniques. This presentation includes the details about how captcha can be used as graphical password which is an integral security option. presentation covers all the points such as problem statement, literature survey, architecture, Mathematical model, examples, advantages, applications etc.
— A CAPTCHA means "Completely Automated
Public Turing test to tell Computers and Humans Apart". It is a
type of challenge-response test used in computing to determine
whether or not the user is human. CaRP is both a Captcha and a
graphical password scheme. CaRP addresses a number of
security problems altogether, such as online guessing attacks,
relay attacks, and, if combined with dual-view technologies,
shoulder-surfing attacks. Particularly, a CaRP password can be
found only probabilistically by automatic online guessing attacks,
even if the password is in the search set. CaRP also offers an
approach to address the well-known image hotspot problem in
popular graphical password systems, such as PassPoints, which
often leads to weak password choices. Thus, a variant to the
login/password scheme, using graphical scheme was introduced.
But it also suffered due to shoulder-surfing and screen dump
attacks. Thus it introduces a framework to proposed (IPAS)
Implicit Password Authentication System, which is protected to
the common attacks suffered by other authentication schemes.
Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)IJERA Editor
Websites such as email providers use Completely Automated Public Turing Test to Tell Computers and Humans Apart (CAPTCHA) which is a simple test easily solved by humans but not by computers and hence provides a way of distinguishing a legitimate human user from an attacker. Methods have been developed like the Optical Character Recognition (OCR) and the third party human attack which have made CAPTCHAs vulnerable. The third party human attack poses a real threat to the use of CAPTCHA which can be easily shown using the Instant Messenger CAPTCHA Attack (IMCA). A new defense system, the interactive CAPTCHA (iCAPTCHA) was developed to defend against third party human solver attacks. The iCAPTCHA is solved via user interactions and the back-and-forth traffic between the client and server amplifies the statistical timing difference between a third party human attacker and a legitimate human user. The aim of this research is to use iCAPTCHA in Smartphones which will be solved after a certain number of password trials. However iCAPTCHA alone cannot provide sufficient security, therefore to further provide security, the iCAPTCHA will be encrypted using RSA and Elliptic Curve Cryptography.
Captcha and graphical passwords are internet security techniques. This presentation includes the details about how captcha can be used as graphical password which is an integral security option. presentation covers all the points such as problem statement, literature survey, architecture, Mathematical model, examples, advantages, applications etc.
— A CAPTCHA means "Completely Automated
Public Turing test to tell Computers and Humans Apart". It is a
type of challenge-response test used in computing to determine
whether or not the user is human. CaRP is both a Captcha and a
graphical password scheme. CaRP addresses a number of
security problems altogether, such as online guessing attacks,
relay attacks, and, if combined with dual-view technologies,
shoulder-surfing attacks. Particularly, a CaRP password can be
found only probabilistically by automatic online guessing attacks,
even if the password is in the search set. CaRP also offers an
approach to address the well-known image hotspot problem in
popular graphical password systems, such as PassPoints, which
often leads to weak password choices. Thus, a variant to the
login/password scheme, using graphical scheme was introduced.
But it also suffered due to shoulder-surfing and screen dump
attacks. Thus it introduces a framework to proposed (IPAS)
Implicit Password Authentication System, which is protected to
the common attacks suffered by other authentication schemes.
Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)IJERA Editor
Websites such as email providers use Completely Automated Public Turing Test to Tell Computers and Humans Apart (CAPTCHA) which is a simple test easily solved by humans but not by computers and hence provides a way of distinguishing a legitimate human user from an attacker. Methods have been developed like the Optical Character Recognition (OCR) and the third party human attack which have made CAPTCHAs vulnerable. The third party human attack poses a real threat to the use of CAPTCHA which can be easily shown using the Instant Messenger CAPTCHA Attack (IMCA). A new defense system, the interactive CAPTCHA (iCAPTCHA) was developed to defend against third party human solver attacks. The iCAPTCHA is solved via user interactions and the back-and-forth traffic between the client and server amplifies the statistical timing difference between a third party human attacker and a legitimate human user. The aim of this research is to use iCAPTCHA in Smartphones which will be solved after a certain number of password trials. However iCAPTCHA alone cannot provide sufficient security, therefore to further provide security, the iCAPTCHA will be encrypted using RSA and Elliptic Curve Cryptography.
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...ijiert bestjournal
When we consider the online service or desktop appl ication there is major issue of security breaching. Old password schemes has some drawbacks like hacking of password,shoulder-surfing attack as far as password is con cern,online password guessing attack,relay attack. Hence there must be system that provides good solution for suc h password cracking attacks. There are many solutions for it a nd various password schemes available that achieves this. The main drawback of these schemes is that users have t o deal with complicated and tedious steps as far as registration and login of user is concern as its logic contains some intense AI processes. These complicated AI pro cesses are exhaustive for common user of the system. In this p aper we proposed authentication scheme which consis t of graphical password based captcha challenge image. I t consists of both a captcha and a graphical passwo rd schemes. We extend the use of captcha as human present recog nition as well as graphical password hence it provi des all benefits of captcha and make system more powerful f rom security point of view.
CAPTCHA as Graphical Password: A Novel Approach to Enhance the Security in WWWIJLT EMAS
This research aims to study the existing password
scheme and to design and develop a new improved graphical
password scheme. A novel protection primitive is presented in
view of strong AI problems namely a new family of graphical
password scheme built up on top of captcha technology, which
we call Captcha as graphical password (CaRP). CaRP is both a
captcha and graphical password scheme. CaRP addresses
number of security issues altogether for example, online guessing
attacks, relay attacks and if combined with dual -view
technologies shoulder-surfing attacks. CaRP likewise offers a
novel way to deal with address the notable image hotspot
problem in well-known
Online Payment System using Steganography and Visual CryptographyIJCERT
In recent time there is rapid growth in E-Commerce market. Major concerns for customers in online shopping are debit card or credit card fraud and personal information security. Identity theft and phishing are common threats of online shopping. Phishing is a method of stealing personal confidential information such as username, passwords and credit card details from victims. It is a social engineering technique used to deceive users. In this paper new method is proposed that uses text based steganography and visual cryptography. It represents new approach which will provide limited information for fund transfer. This method secures the customer's data and increases customer's confidence and prevents identity theft.
Cryptography is a process used for sending information in secret way. Goal of this process is to provide protection for information but in different way. In this paper our motive to represent a new method for protection that is generated by combination of RSA and 2 bit rotation mechanism of cryptography. There are many algorithms exist for this process. For cryptography there are algorithms like RSA, IDEA, AES, and DES but here we are using only one algorithm from these that is RSA which is enough to implement combined process using 2 bit rotation. The encrypted image is used as input for network for further implementation.RSA encrypt image with 1 bit rotation. In 1 bit rotation only 1 bit is shifted and at decrypt side shifted bit are reversed. But to make it more secure we are going to perform 2 bit rotation due to which it is more secure as compared to existing algorithm. After applying the 2 bit rotation we perform the permutation of that image that will give us encrypted image. Shivam Kumar | Dr. Ganesh D "Image Cryptography using RSA Algorithm" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd42408.pdf Paper URL: https://www.ijtsrd.comcomputer-science/computer-security/42408/image-cryptography-using-rsa-algorithm/shivam-kumar
Security analysis of fbdk block cipher for digital imageseSAT Journals
Abstract Network security is one of the major concerns in the modern world. In this regard, a strong security technique is required to protect user data. Cryptography techniques plays an important role in secured transmission through encryption of data and thus ensuring integrity, authenticity, confidentiality of information. Several encryption algorithms have been proposed like AES (Advanced Encryption Standard), DES (Data Encryption Standard) and RSA. These provide very good encryption for text applications. However, these encryption schemes appear not to be ideal for image applications. Some algorithms like GKSBC and RC6 provide very good encryption for digital images. New techniques are emerging that are aimed at providing secured transmission of images over networks. The FBDK (Fixed Block with Dynamic Key Size) block cipher is a new cryptography technique designed using simple operations like XOR, substitutions, circular shifting. The FBDK algorithm is applicable for blocks of any size with key size being dynamic for each block. It does not involve any complex mathematical operations like modular exponentiation. It is a hybrid cryptography technique based on symmetric key and asymmetric key cryptosystems. This paper investigates the security of FBDK block cipher for digital images against brute-force attack, statistical analysis and Differential analysis attacks. In this paper, various security analysis tests has been discussed which are helpful in finding out whether the FBDK encryption algorithm can do secure encryption or not. Experimental results proves the security and efficiency of FBDK cipher for images against all aforementioned types of attacks which justifies its consideration for real time image applications. Keywords: Cryptography, Ciphers, Encryption, Security, and cryptanalysis.
Password authentication with smart card is one of the simplest and efficient authentication mechanisms to ensure secure communication over insecure network environments. Recently, Tsai et al. proposed an improved password authentication scheme for smart card. Their scheme is more secure than the other previous schemes. In this paper, we show Tsai et al.’s scheme is vulnerable to password guessing attack and has computational overhead. Furthermore, we propose an enhanced password authentication scheme to eliminate the security vulnerability and enhance the overhead. By presenting concrete analysis of security and performance, we show that the proposed scheme cannot only resist various well known attacks, but also is more efficient than the other related works, and thus is feasible for practical applications.
Smart Card technology is the emerging technology which is developing among
common masses in our culture and widely used in the sectors of banking and industries.
Many research works are undergoing in this area to provide highly confidential data
transmission. Existing Scheme provides a security against offline attack for the lost Smart
Card using Elliptic Curve Cryptography (ECC) but it requires more communication and
computation overhead with higher key length. To overcome this limitation, DNA based
Password authentication using Hyper Elliptic Curve Cryptography (HECC) scheme is
proposed. It provides more security than existing system which allows server and smartcard
to exchange the generated password and verify each other. This system exploits the
advantages of Hyperelliptic Curve Cryptography (HECC) technique which is having lesser
key size, less communication and computation overhead for Password generation and
signature verification process.
A survey on encryption algorithms for data securityeSAT Journals
Abstract In current world the security is more important in all fields. The data that is transferred between any must be retrieved securely. For this secure data retrieval we use cryptographic solutions. Disruption Tolerant Network (DTN) technologies have become successful solutions that permit wireless devices to speak with one another and access the guidance dependably by exploiting auxiliary storage nodes. The cryptographic solutions used for the retrieval of data are encryption algorithms. In this paper we discussed several algorithms used for the secure data retrieval in all fields. Keywords: Security, Cryptography, DTN and Encryption
Security for Hard AI Problems Using CaRP Authenticationpaperpublications3
Abstract: Using hard AI problems for security is emerging as an exciting new paradigm, but has been underexplored. This approach present a new security primitive based on hard AI problems, namely, a novel family of graphical password systems built on top of Captcha technology, which is called Captcha as graphical passwords (CaRP). CaRP is both a Captcha and a graphical password scheme. CaRP addresses a number of security problems altogether, such as online guessing attacks, relay attacks, and, if combined with dual-view technologies, shoulder-surfing attacks. Notably, a CaRP password can be found only probabilistically by automatic online guessing attacks even if the password is in the search set.
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...ijiert bestjournal
When we consider the online service or desktop appl ication there is major issue of security breaching. Old password schemes has some drawbacks like hacking of password,shoulder-surfing attack as far as password is con cern,online password guessing attack,relay attack. Hence there must be system that provides good solution for suc h password cracking attacks. There are many solutions for it a nd various password schemes available that achieves this. The main drawback of these schemes is that users have t o deal with complicated and tedious steps as far as registration and login of user is concern as its logic contains some intense AI processes. These complicated AI pro cesses are exhaustive for common user of the system. In this p aper we proposed authentication scheme which consis t of graphical password based captcha challenge image. I t consists of both a captcha and a graphical passwo rd schemes. We extend the use of captcha as human present recog nition as well as graphical password hence it provi des all benefits of captcha and make system more powerful f rom security point of view.
CAPTCHA as Graphical Password: A Novel Approach to Enhance the Security in WWWIJLT EMAS
This research aims to study the existing password
scheme and to design and develop a new improved graphical
password scheme. A novel protection primitive is presented in
view of strong AI problems namely a new family of graphical
password scheme built up on top of captcha technology, which
we call Captcha as graphical password (CaRP). CaRP is both a
captcha and graphical password scheme. CaRP addresses
number of security issues altogether for example, online guessing
attacks, relay attacks and if combined with dual -view
technologies shoulder-surfing attacks. CaRP likewise offers a
novel way to deal with address the notable image hotspot
problem in well-known
Online Payment System using Steganography and Visual CryptographyIJCERT
In recent time there is rapid growth in E-Commerce market. Major concerns for customers in online shopping are debit card or credit card fraud and personal information security. Identity theft and phishing are common threats of online shopping. Phishing is a method of stealing personal confidential information such as username, passwords and credit card details from victims. It is a social engineering technique used to deceive users. In this paper new method is proposed that uses text based steganography and visual cryptography. It represents new approach which will provide limited information for fund transfer. This method secures the customer's data and increases customer's confidence and prevents identity theft.
Cryptography is a process used for sending information in secret way. Goal of this process is to provide protection for information but in different way. In this paper our motive to represent a new method for protection that is generated by combination of RSA and 2 bit rotation mechanism of cryptography. There are many algorithms exist for this process. For cryptography there are algorithms like RSA, IDEA, AES, and DES but here we are using only one algorithm from these that is RSA which is enough to implement combined process using 2 bit rotation. The encrypted image is used as input for network for further implementation.RSA encrypt image with 1 bit rotation. In 1 bit rotation only 1 bit is shifted and at decrypt side shifted bit are reversed. But to make it more secure we are going to perform 2 bit rotation due to which it is more secure as compared to existing algorithm. After applying the 2 bit rotation we perform the permutation of that image that will give us encrypted image. Shivam Kumar | Dr. Ganesh D "Image Cryptography using RSA Algorithm" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd42408.pdf Paper URL: https://www.ijtsrd.comcomputer-science/computer-security/42408/image-cryptography-using-rsa-algorithm/shivam-kumar
Security analysis of fbdk block cipher for digital imageseSAT Journals
Abstract Network security is one of the major concerns in the modern world. In this regard, a strong security technique is required to protect user data. Cryptography techniques plays an important role in secured transmission through encryption of data and thus ensuring integrity, authenticity, confidentiality of information. Several encryption algorithms have been proposed like AES (Advanced Encryption Standard), DES (Data Encryption Standard) and RSA. These provide very good encryption for text applications. However, these encryption schemes appear not to be ideal for image applications. Some algorithms like GKSBC and RC6 provide very good encryption for digital images. New techniques are emerging that are aimed at providing secured transmission of images over networks. The FBDK (Fixed Block with Dynamic Key Size) block cipher is a new cryptography technique designed using simple operations like XOR, substitutions, circular shifting. The FBDK algorithm is applicable for blocks of any size with key size being dynamic for each block. It does not involve any complex mathematical operations like modular exponentiation. It is a hybrid cryptography technique based on symmetric key and asymmetric key cryptosystems. This paper investigates the security of FBDK block cipher for digital images against brute-force attack, statistical analysis and Differential analysis attacks. In this paper, various security analysis tests has been discussed which are helpful in finding out whether the FBDK encryption algorithm can do secure encryption or not. Experimental results proves the security and efficiency of FBDK cipher for images against all aforementioned types of attacks which justifies its consideration for real time image applications. Keywords: Cryptography, Ciphers, Encryption, Security, and cryptanalysis.
Password authentication with smart card is one of the simplest and efficient authentication mechanisms to ensure secure communication over insecure network environments. Recently, Tsai et al. proposed an improved password authentication scheme for smart card. Their scheme is more secure than the other previous schemes. In this paper, we show Tsai et al.’s scheme is vulnerable to password guessing attack and has computational overhead. Furthermore, we propose an enhanced password authentication scheme to eliminate the security vulnerability and enhance the overhead. By presenting concrete analysis of security and performance, we show that the proposed scheme cannot only resist various well known attacks, but also is more efficient than the other related works, and thus is feasible for practical applications.
Smart Card technology is the emerging technology which is developing among
common masses in our culture and widely used in the sectors of banking and industries.
Many research works are undergoing in this area to provide highly confidential data
transmission. Existing Scheme provides a security against offline attack for the lost Smart
Card using Elliptic Curve Cryptography (ECC) but it requires more communication and
computation overhead with higher key length. To overcome this limitation, DNA based
Password authentication using Hyper Elliptic Curve Cryptography (HECC) scheme is
proposed. It provides more security than existing system which allows server and smartcard
to exchange the generated password and verify each other. This system exploits the
advantages of Hyperelliptic Curve Cryptography (HECC) technique which is having lesser
key size, less communication and computation overhead for Password generation and
signature verification process.
A survey on encryption algorithms for data securityeSAT Journals
Abstract In current world the security is more important in all fields. The data that is transferred between any must be retrieved securely. For this secure data retrieval we use cryptographic solutions. Disruption Tolerant Network (DTN) technologies have become successful solutions that permit wireless devices to speak with one another and access the guidance dependably by exploiting auxiliary storage nodes. The cryptographic solutions used for the retrieval of data are encryption algorithms. In this paper we discussed several algorithms used for the secure data retrieval in all fields. Keywords: Security, Cryptography, DTN and Encryption
Security for Hard AI Problems Using CaRP Authenticationpaperpublications3
Abstract: Using hard AI problems for security is emerging as an exciting new paradigm, but has been underexplored. This approach present a new security primitive based on hard AI problems, namely, a novel family of graphical password systems built on top of Captcha technology, which is called Captcha as graphical passwords (CaRP). CaRP is both a Captcha and a graphical password scheme. CaRP addresses a number of security problems altogether, such as online guessing attacks, relay attacks, and, if combined with dual-view technologies, shoulder-surfing attacks. Notably, a CaRP password can be found only probabilistically by automatic online guessing attacks even if the password is in the search set.
At Softroniics we provide job oriented training for freshers in IT sector. We are providing IEEE project guidance and Final year project guidance. We are Pioneers in all leading technologies like Android, Java, .NET, PHP, Python, Embedded Systems, Matlab, NS2, VLSI, Modelsim, Tanner, Xilinx etc. We are specializiling in technologies like Big Data, Cloud Computing, Internet Of Things (iOT), Data Mining, Networking, Information Security, Image Processing and many other. We are providing long term and short term internship also. We are also providing IEEE project support at Calicut, Thrissur and Palakkad. For more details contact 9037291113, 7907435072
Many security primitives are supported hard
mathematical problems. Passwords remain the foremost
widely used authentication method despite their well-known
security weaknesses. CAPTCHA authentication is clearly a
practical problem.
Keystroke Dynamics Authentication with Project Management SystemIJSRD
Generally user authentication is done using username and password that is called as login process. This login process is not more secure because, however a login session is still unprotected to impersonator when the user leaves his computer without logging off. Keystroke dynamics methods can be made useful to verify a user by extracting some typing features then, after the authentication process has successfully ended. From the last decade several studies proposed the use of keystroke dynamics as a behavioral biometric tool to verify users. We propose a new method, for representing the keystroke patterns by joining similar pairs of consecutive keystrokes. The above proposed method is used to consider clustering the di-graphs which are based on their temporal features. In this project, authentication system is provide to project management system that make more Secure management system without acknowledging unauthorized user. The Project Management System addresses the management of software projects. It provides the framework for organizing and managing resources in such a way that these resources deliver all the work required to complete a software project within defined scope, time and cost constraints. The system applies only to the management of software projects and is a tool that facilitates decision making.
Similar to IRJET- Carp a Graphical Password: Enhancing Security using AI (20)
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.