SlideShare a Scribd company logo
The Master of IEEE Projects
Copyright © 2015 LeMeniz Infotech. All rights reserved
Page number 1
IEEE Master
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
SBVLC: Secure Barcode-based Visible Light
Communication for Smartphones
Abstract :
2D barcodes have enjoyed a significant penetration rate in mobile applications.
This is largely due to the extremely low barrier to adoption – almost every camera-
enabled smartphone can scan 2D barcodes. As an alternative to NFC technology,
2D barcodes have been increasingly used for security-sensitive mobile applications
including mobile payments and personal identification. However, the security of
barcode-based communication in mobile applications has not been systematically
studied. Due to the visual nature, 2D barcodes are subject to eavesdropping when
they are displayed on the smartphone screens. On the other hand, the fundamental
design principles of 2D barcodes make it difficult to add security features. In this
paper, we propose SBVLC - a secure system for barcode-based visible light
communication (VLC) between smartphones. We formally analyze the security of
SBVLC based on geometric models and propose physical security enhancement
mechanisms for barcode communication by manipulating screen view angles and
leveraging user-induced motions. We then develop three secure data exchange
schemes that encode information in barcode streams. These schemes are useful in
many security-sensitive mobile applications including private information sharing,
The Master of IEEE Projects
Copyright © 2015 LeMeniz Infotech. All rights reserved
Page number 2
IEEE Master
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
secure device pairing, and contactless payment. SBVLC is evaluated through
xtensive experiments on both Android and iOS smartphones.
Existing system:
Existing barcode applications are based on a single barcode exchange, which is
insufficient to establish a secure communication channel. Recently, several
systems are designed to stream a series of barcodes between a LCD screen and
smartphone camera. These systems can enable high-throughput ad hoc
communication between smartphones without relying on the Internet connectivity.
However, they are designed based on highly customized barcodes which are not
widely adopted in practice
.Disadvantage :
The security of barcode-based communication in mobile applications has not been
systematically studied. Due to the visual nature, 2D barcodes are subject to
eavesdropping when they are displayed on the smartphone screens
The Master of IEEE Projects
Copyright © 2015 LeMeniz Infotech. All rights reserved
Page number 3
IEEE Master
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
 Above Diagram represent System Architecture
Proposed system:
In this paper, we propose SBVLC (Secure Barcode-based Visible Light
Communication) – a novel secure ad-hoc wireless communication system for
smartphones. Unlike NFC, SBVLC can be widely adopted by most off-the-shelf
smartphones. It works across various smartphone platforms equipped with a color
screen and a front-facing camera. Our system can also be easily extended to
support other mobile and portable devices such as laptops and tablets. We use
rigorous 2D and 3D geometric models to thoroughly examine the security of the
proposed system. To the best of our knowledge, this work is the first that focuses
on modelling and analyzing the security of VLC channel and barcode-based
communication between smartphones. Specifically, we first design a real-time
duplex screen-camera VLC channel based on 2D barcode streaming. By
The Master of IEEE Projects
Copyright © 2015 LeMeniz Infotech. All rights reserved
Page number 4
IEEE Master
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
embedding extra information into the color of Quick Response (QR) codes, we
developed a fast QR filtering technique to quickly remove the non-QR and
duplicate QR frame images.propose Mobile phones are one of the most commonly
used electronic gadgets today. Here, we intend to develop a modular and friendly
application using cloud based OCR platform and the built in Android TTS for
producing an audible result of the text file.
Advantages:
 Two-phase message transfer scheme
 Smartphone handshake scheme
 All-or-nothing data streaming scheme
Conclusion :
We proposed SBVLC, utilizing a fully duplex smartphone VLC channel based on 2D
barcode. On top of the duplex VLC channel, we further propose three secure
communication schemes. All SBVLC schemes are evaluated through extensive
experiments on Android smartphones, and the results show that our system
achieves high level security and NFC-comparable throughput. The system can be
used for private information sharing, secure device pairing and secure mobile
The Master of IEEE Projects
Copyright © 2015 LeMeniz Infotech. All rights reserved
Page number 5
IEEE Master
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
payment, etc. To our best knowledge, this work is the first one that formally
defines and studies the security of a smartphone VLC system. It serves as a
milestone for further development in secure VLC systems for smartphones. In
future work, we would like to increase the system throughput, using color
barcode streaming as discussed in. We will also extend our system to support
other mobile and portable devices, e.g. laptops and tablets.
Hardware Specification :
 System : Pentium IV 2.4 GHz.
 Hard Disk : 40 GB.
 Floppy Drive : 44 Mb.
 Monitor : 15 VGA Colour.
 Mouse : Logitech
 Ram : 512 Mb.
 MOBILE : ANDROID
Software Specification :
 Operating system : Windows 7.
 Coding Language : Java 1.7
 Tool Kit : Android 2.3 ABOVE
The Master of IEEE Projects
Copyright © 2015 LeMeniz Infotech. All rights reserved
Page number 6
IEEE Master
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
 IDE : Android Studio
Reference :
*1+ B. Zhang, K. Ren, G. Xing, X. Fu, and C. Wang, “SBVLC: secure barcode-based
visible light communication for smartphones,” in IEEE Conference INFOCOM 2014,
2014, pp. 2661–2669.
*2+ L. Francis, G. Hancke, K. Mayes, and K. Markantonakis, “Practical relay attack
on contactless transactions by using nfc mobile phones,” ePrint Archive, Report
2011/618, 2011.
*3+ M. Allah, “Strengths and weaknesses of near field communication (nfc)
technology,” GJCST, vol. 11, no. 3, 2011.
[4] Barcode payment service, http://gigaom.com/2012/05/30/paypal-rollsout-
barcode-payments-in-the-uk/.
*5+ T. Langlotz and O. Bimber, “Unsynchronized 4d barcodes: coding and decoding
time-multiplexed 2d colorcodes,” in ISVC, 2007.

More Related Content

What's hot

SBVLC: Secure Barcode-based Visible Light Communication for Smart phones
SBVLC: Secure Barcode-based Visible Light Communication for Smart phonesSBVLC: Secure Barcode-based Visible Light Communication for Smart phones
SBVLC: Secure Barcode-based Visible Light Communication for Smart phones
Kamal Spring
 
1 importance of light weight authentication in iot
1 importance of light weight authentication in iot1 importance of light weight authentication in iot
1 importance of light weight authentication in iot
Chintan Patel
 
Reinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsReinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsNirmal Misra
 
Bio Metrics
Bio MetricsBio Metrics
Bio Metrics
nayakslideshare
 
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET -  	  Cyber Security Threats and Measures in Context with IoTIRJET -  	  Cyber Security Threats and Measures in Context with IoT
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET Journal
 
SBVLC: Secure Barcode-based Visible Light Communication for Smart phones
SBVLC: Secure Barcode-based Visible Light Communication for Smart phonesSBVLC: Secure Barcode-based Visible Light Communication for Smart phones
SBVLC: Secure Barcode-based Visible Light Communication for Smart phones
Kamal Spring
 
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...
journalBEEI
 
The Revolutionary Solution in Secured Digital Identification
The Revolutionary Solution in Secured Digital IdentificationThe Revolutionary Solution in Secured Digital Identification
The Revolutionary Solution in Secured Digital Identification
INPI ASIA Admin
 
Diploma Project titles 2013 for CSE,IT,EEE,ECE / B.Sc, BCA Project Titles.pdf
Diploma Project titles 2013 for CSE,IT,EEE,ECE / B.Sc, BCA Project Titles.pdfDiploma Project titles 2013 for CSE,IT,EEE,ECE / B.Sc, BCA Project Titles.pdf
Diploma Project titles 2013 for CSE,IT,EEE,ECE / B.Sc, BCA Project Titles.pdf
Irissolution
 
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...Lillie Coney
 
Iot Security
Iot SecurityIot Security
Iot Security
MAITREYA MISRA
 
NFC Everywhere Brochure 2016_WEB
NFC Everywhere Brochure 2016_WEBNFC Everywhere Brochure 2016_WEB
NFC Everywhere Brochure 2016_WEBRichard Schmidmaier
 
A Survey on Communication for Smartphone
A Survey on Communication for SmartphoneA Survey on Communication for Smartphone
A Survey on Communication for Smartphone
Editor IJMTER
 
Qualcomm ® Snapdragon Sense ™ ID 3D Fingerprint Technology
Qualcomm ® Snapdragon Sense ™ ID 3D Fingerprint TechnologyQualcomm ® Snapdragon Sense ™ ID 3D Fingerprint Technology
Qualcomm ® Snapdragon Sense ™ ID 3D Fingerprint Technology
FIDO Alliance
 
Identive Group | Press Release | Identive Group's RFID and Near Field Communi...
Identive Group | Press Release | Identive Group's RFID and Near Field Communi...Identive Group | Press Release | Identive Group's RFID and Near Field Communi...
Identive Group | Press Release | Identive Group's RFID and Near Field Communi...
Identive
 
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart LockIRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET Journal
 
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok LabsFIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
Nok Nok Labs, Inc
 

What's hot (18)

SBVLC: Secure Barcode-based Visible Light Communication for Smart phones
SBVLC: Secure Barcode-based Visible Light Communication for Smart phonesSBVLC: Secure Barcode-based Visible Light Communication for Smart phones
SBVLC: Secure Barcode-based Visible Light Communication for Smart phones
 
1 importance of light weight authentication in iot
1 importance of light weight authentication in iot1 importance of light weight authentication in iot
1 importance of light weight authentication in iot
 
Reinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsReinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of Things
 
Bio Metrics
Bio MetricsBio Metrics
Bio Metrics
 
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET -  	  Cyber Security Threats and Measures in Context with IoTIRJET -  	  Cyber Security Threats and Measures in Context with IoT
IRJET - Cyber Security Threats and Measures in Context with IoT
 
draft.ResearchPoster
draft.ResearchPosterdraft.ResearchPoster
draft.ResearchPoster
 
SBVLC: Secure Barcode-based Visible Light Communication for Smart phones
SBVLC: Secure Barcode-based Visible Light Communication for Smart phonesSBVLC: Secure Barcode-based Visible Light Communication for Smart phones
SBVLC: Secure Barcode-based Visible Light Communication for Smart phones
 
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...
 
The Revolutionary Solution in Secured Digital Identification
The Revolutionary Solution in Secured Digital IdentificationThe Revolutionary Solution in Secured Digital Identification
The Revolutionary Solution in Secured Digital Identification
 
Diploma Project titles 2013 for CSE,IT,EEE,ECE / B.Sc, BCA Project Titles.pdf
Diploma Project titles 2013 for CSE,IT,EEE,ECE / B.Sc, BCA Project Titles.pdfDiploma Project titles 2013 for CSE,IT,EEE,ECE / B.Sc, BCA Project Titles.pdf
Diploma Project titles 2013 for CSE,IT,EEE,ECE / B.Sc, BCA Project Titles.pdf
 
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
 
Iot Security
Iot SecurityIot Security
Iot Security
 
NFC Everywhere Brochure 2016_WEB
NFC Everywhere Brochure 2016_WEBNFC Everywhere Brochure 2016_WEB
NFC Everywhere Brochure 2016_WEB
 
A Survey on Communication for Smartphone
A Survey on Communication for SmartphoneA Survey on Communication for Smartphone
A Survey on Communication for Smartphone
 
Qualcomm ® Snapdragon Sense ™ ID 3D Fingerprint Technology
Qualcomm ® Snapdragon Sense ™ ID 3D Fingerprint TechnologyQualcomm ® Snapdragon Sense ™ ID 3D Fingerprint Technology
Qualcomm ® Snapdragon Sense ™ ID 3D Fingerprint Technology
 
Identive Group | Press Release | Identive Group's RFID and Near Field Communi...
Identive Group | Press Release | Identive Group's RFID and Near Field Communi...Identive Group | Press Release | Identive Group's RFID and Near Field Communi...
Identive Group | Press Release | Identive Group's RFID and Near Field Communi...
 
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart LockIRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
 
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok LabsFIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
 

Viewers also liked

Visible light communication
Visible light communicationVisible light communication
Visible light communicationNaveen Sihag
 
IEEE SOFTWARE TITLES 2015-16
IEEE SOFTWARE TITLES 2015-16IEEE SOFTWARE TITLES 2015-16
IEEE SOFTWARE TITLES 2015-16
Spiro Vellore
 
Intro geog 120 spr 2016 sbvc
Intro geog 120 spr 2016 sbvcIntro geog 120 spr 2016 sbvc
Intro geog 120 spr 2016 sbvc
Lisa Schmidt
 
2015 and 2016 IEEE Projects for Network Security
2015 and 2016 IEEE Projects for Network Security2015 and 2016 IEEE Projects for Network Security
2015 and 2016 IEEE Projects for Network Security
Manju Nath
 
Energy aware load balancing and application scaling for the cloud ecosystem
Energy aware load balancing and application scaling for the cloud ecosystemEnergy aware load balancing and application scaling for the cloud ecosystem
Energy aware load balancing and application scaling for the cloud ecosystem
LeMeniz Infotech
 
Two stage power conversion architecture suitable for wide range input voltage
Two stage power conversion architecture suitable for wide range input voltageTwo stage power conversion architecture suitable for wide range input voltage
Two stage power conversion architecture suitable for wide range input voltage
LeMeniz Infotech
 
Vector sparse representation of color image using quaternion matrix analysis.
Vector sparse representation of color image using quaternion matrix analysis.Vector sparse representation of color image using quaternion matrix analysis.
Vector sparse representation of color image using quaternion matrix analysis.
LeMeniz Infotech
 
Highly reliable transformerless photovoltaic inverters with leakage current a...
Highly reliable transformerless photovoltaic inverters with leakage current a...Highly reliable transformerless photovoltaic inverters with leakage current a...
Highly reliable transformerless photovoltaic inverters with leakage current a...
LeMeniz Infotech
 
Мария Губайдуллина (Registratura.ru) о лояльности в SMM
Мария Губайдуллина (Registratura.ru) о лояльности в SMMМария Губайдуллина (Registratura.ru) о лояльности в SMM
Мария Губайдуллина (Registratura.ru) о лояльности в SMMEkaterina Giganova
 
All About Steps In Home Care
All About Steps In Home CareAll About Steps In Home Care
All About Steps In Home Care
Shan Wade
 
Swedish_Technology_Look_And_Feel
Swedish_Technology_Look_And_FeelSwedish_Technology_Look_And_Feel
Swedish_Technology_Look_And_FeelSwedish Technology
 
A multilevel energy buffer and voltage modulator for grid interfaced microinv...
A multilevel energy buffer and voltage modulator for grid interfaced microinv...A multilevel energy buffer and voltage modulator for grid interfaced microinv...
A multilevel energy buffer and voltage modulator for grid interfaced microinv...
LeMeniz Infotech
 
Presentation jenny lourdes t. cayanan
Presentation   jenny lourdes t. cayananPresentation   jenny lourdes t. cayanan
Presentation jenny lourdes t. cayananJenny Cayanan
 
Dominating set and network coding based routing in wireless mesh netwoks
Dominating set and network coding based routing in wireless mesh netwoksDominating set and network coding based routing in wireless mesh netwoks
Dominating set and network coding based routing in wireless mesh netwoks
LeMeniz Infotech
 
Educacion a distancia
Educacion a distancia Educacion a distancia
Educacion a distancia
mirianaqp
 

Viewers also liked (17)

Visible light communication
Visible light communicationVisible light communication
Visible light communication
 
IEEE SOFTWARE TITLES 2015-16
IEEE SOFTWARE TITLES 2015-16IEEE SOFTWARE TITLES 2015-16
IEEE SOFTWARE TITLES 2015-16
 
Intro geog 120 spr 2016 sbvc
Intro geog 120 spr 2016 sbvcIntro geog 120 spr 2016 sbvc
Intro geog 120 spr 2016 sbvc
 
2015 and 2016 IEEE Projects for Network Security
2015 and 2016 IEEE Projects for Network Security2015 and 2016 IEEE Projects for Network Security
2015 and 2016 IEEE Projects for Network Security
 
Energy aware load balancing and application scaling for the cloud ecosystem
Energy aware load balancing and application scaling for the cloud ecosystemEnergy aware load balancing and application scaling for the cloud ecosystem
Energy aware load balancing and application scaling for the cloud ecosystem
 
Two stage power conversion architecture suitable for wide range input voltage
Two stage power conversion architecture suitable for wide range input voltageTwo stage power conversion architecture suitable for wide range input voltage
Two stage power conversion architecture suitable for wide range input voltage
 
Vector sparse representation of color image using quaternion matrix analysis.
Vector sparse representation of color image using quaternion matrix analysis.Vector sparse representation of color image using quaternion matrix analysis.
Vector sparse representation of color image using quaternion matrix analysis.
 
Highly reliable transformerless photovoltaic inverters with leakage current a...
Highly reliable transformerless photovoltaic inverters with leakage current a...Highly reliable transformerless photovoltaic inverters with leakage current a...
Highly reliable transformerless photovoltaic inverters with leakage current a...
 
Мария Губайдуллина (Registratura.ru) о лояльности в SMM
Мария Губайдуллина (Registratura.ru) о лояльности в SMMМария Губайдуллина (Registratura.ru) о лояльности в SMM
Мария Губайдуллина (Registratura.ru) о лояльности в SMM
 
All About Steps In Home Care
All About Steps In Home CareAll About Steps In Home Care
All About Steps In Home Care
 
Q4
Q4Q4
Q4
 
Swedish_Technology_Look_And_Feel
Swedish_Technology_Look_And_FeelSwedish_Technology_Look_And_Feel
Swedish_Technology_Look_And_Feel
 
A multilevel energy buffer and voltage modulator for grid interfaced microinv...
A multilevel energy buffer and voltage modulator for grid interfaced microinv...A multilevel energy buffer and voltage modulator for grid interfaced microinv...
A multilevel energy buffer and voltage modulator for grid interfaced microinv...
 
Presentation jenny lourdes t. cayanan
Presentation   jenny lourdes t. cayananPresentation   jenny lourdes t. cayanan
Presentation jenny lourdes t. cayanan
 
Dominating set and network coding based routing in wireless mesh netwoks
Dominating set and network coding based routing in wireless mesh netwoksDominating set and network coding based routing in wireless mesh netwoks
Dominating set and network coding based routing in wireless mesh netwoks
 
Educacion a distancia
Educacion a distancia Educacion a distancia
Educacion a distancia
 
Question 7
Question 7Question 7
Question 7
 

Similar to Sbvlc secure barcode based visible light communication for smartphones

151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1pStéphane Roule
 
Implementation of Real Time Home Automation of Embedded System Design with In...
Implementation of Real Time Home Automation of Embedded System Design with In...Implementation of Real Time Home Automation of Embedded System Design with In...
Implementation of Real Time Home Automation of Embedded System Design with In...
IRJET Journal
 
Crypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA AlgorithmCrypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA Algorithm
IRJET Journal
 
Report
ReportReport
Report
Vrishab Ml
 
A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...
IJECEIAES
 
Pay-Cloak:Biometric
Pay-Cloak:BiometricPay-Cloak:Biometric
Pay-Cloak:Biometric
ijtsrd
 
Syslog Technologies
 Syslog Technologies Syslog Technologies
Syslog Technologies
syslogtechnology
 
Bank Locker System Using Fingerprint Authentication & Image Processing
Bank Locker System Using Fingerprint Authentication & Image ProcessingBank Locker System Using Fingerprint Authentication & Image Processing
Bank Locker System Using Fingerprint Authentication & Image Processing
IRJET Journal
 
Vivek Chan | Technology Consultant
Vivek Chan | Technology Consultant Vivek Chan | Technology Consultant
Vivek Chan | Technology Consultant
Vivek chan
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
FIDO Alliance
 
Android titles adrit solutions
Android titles adrit solutionsAndroid titles adrit solutions
Android titles adrit solutions
Adrit Techno Solutions
 
Video streaming using wireless multi hop in android phones
Video streaming using wireless multi hop in android phonesVideo streaming using wireless multi hop in android phones
Video streaming using wireless multi hop in android phonesIAEME Publication
 
Virtual banking system using iot
Virtual banking system using iotVirtual banking system using iot
Virtual banking system using iot
Deva67SS
 
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
IRJET -  	  Securing Communication among IoT Devices using Blockchain ProxyIRJET -  	  Securing Communication among IoT Devices using Blockchain Proxy
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
IRJET Journal
 
eMsecure
eMsecureeMsecure
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx
1SI19IS064TEJASS
 
Dissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinhaDissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinha
Avinash Sinha
 
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IRJET Journal
 
Smart Security System IOT
Smart Security System IOTSmart Security System IOT
Smart Security System IOT
ijtsrd
 
A Study on Modern Methods for Detecting Mobile Malware
A Study on Modern Methods for Detecting Mobile MalwareA Study on Modern Methods for Detecting Mobile Malware
A Study on Modern Methods for Detecting Mobile Malware
IRJET Journal
 

Similar to Sbvlc secure barcode based visible light communication for smartphones (20)

151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p
 
Implementation of Real Time Home Automation of Embedded System Design with In...
Implementation of Real Time Home Automation of Embedded System Design with In...Implementation of Real Time Home Automation of Embedded System Design with In...
Implementation of Real Time Home Automation of Embedded System Design with In...
 
Crypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA AlgorithmCrypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA Algorithm
 
Report
ReportReport
Report
 
A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...
 
Pay-Cloak:Biometric
Pay-Cloak:BiometricPay-Cloak:Biometric
Pay-Cloak:Biometric
 
Syslog Technologies
 Syslog Technologies Syslog Technologies
Syslog Technologies
 
Bank Locker System Using Fingerprint Authentication & Image Processing
Bank Locker System Using Fingerprint Authentication & Image ProcessingBank Locker System Using Fingerprint Authentication & Image Processing
Bank Locker System Using Fingerprint Authentication & Image Processing
 
Vivek Chan | Technology Consultant
Vivek Chan | Technology Consultant Vivek Chan | Technology Consultant
Vivek Chan | Technology Consultant
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 
Android titles adrit solutions
Android titles adrit solutionsAndroid titles adrit solutions
Android titles adrit solutions
 
Video streaming using wireless multi hop in android phones
Video streaming using wireless multi hop in android phonesVideo streaming using wireless multi hop in android phones
Video streaming using wireless multi hop in android phones
 
Virtual banking system using iot
Virtual banking system using iotVirtual banking system using iot
Virtual banking system using iot
 
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
IRJET -  	  Securing Communication among IoT Devices using Blockchain ProxyIRJET -  	  Securing Communication among IoT Devices using Blockchain Proxy
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
 
eMsecure
eMsecureeMsecure
eMsecure
 
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx
 
Dissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinhaDissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinha
 
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
 
Smart Security System IOT
Smart Security System IOTSmart Security System IOT
Smart Security System IOT
 
A Study on Modern Methods for Detecting Mobile Malware
A Study on Modern Methods for Detecting Mobile MalwareA Study on Modern Methods for Detecting Mobile Malware
A Study on Modern Methods for Detecting Mobile Malware
 

More from LeMeniz Infotech

A fast acquisition all-digital delay-locked loop using a starting-bit predict...
A fast acquisition all-digital delay-locked loop using a starting-bit predict...A fast acquisition all-digital delay-locked loop using a starting-bit predict...
A fast acquisition all-digital delay-locked loop using a starting-bit predict...
LeMeniz Infotech
 
A fast fault tolerant architecture for sauvola local image thresholding algor...
A fast fault tolerant architecture for sauvola local image thresholding algor...A fast fault tolerant architecture for sauvola local image thresholding algor...
A fast fault tolerant architecture for sauvola local image thresholding algor...
LeMeniz Infotech
 
A dynamically reconfigurable multi asip architecture for multistandard and mu...
A dynamically reconfigurable multi asip architecture for multistandard and mu...A dynamically reconfigurable multi asip architecture for multistandard and mu...
A dynamically reconfigurable multi asip architecture for multistandard and mu...
LeMeniz Infotech
 
Interleaved digital power factor correction based on the sliding mode approach
Interleaved digital power factor correction based on the sliding mode approachInterleaved digital power factor correction based on the sliding mode approach
Interleaved digital power factor correction based on the sliding mode approach
LeMeniz Infotech
 
Bumpless control for reduced thd in power factor correction circuits
Bumpless control for reduced thd in power factor correction circuitsBumpless control for reduced thd in power factor correction circuits
Bumpless control for reduced thd in power factor correction circuits
LeMeniz Infotech
 
A bidirectional single stage three phase rectifier with high-frequency isolat...
A bidirectional single stage three phase rectifier with high-frequency isolat...A bidirectional single stage three phase rectifier with high-frequency isolat...
A bidirectional single stage three phase rectifier with high-frequency isolat...
LeMeniz Infotech
 
A bidirectional three level llc resonant converter with pwam control
A bidirectional three level llc resonant converter with pwam controlA bidirectional three level llc resonant converter with pwam control
A bidirectional three level llc resonant converter with pwam control
LeMeniz Infotech
 
Efficient single phase transformerless inverter for grid tied pvg system with...
Efficient single phase transformerless inverter for grid tied pvg system with...Efficient single phase transformerless inverter for grid tied pvg system with...
Efficient single phase transformerless inverter for grid tied pvg system with...
LeMeniz Infotech
 
Grid current-feedback active damping for lcl resonance in grid-connected volt...
Grid current-feedback active damping for lcl resonance in grid-connected volt...Grid current-feedback active damping for lcl resonance in grid-connected volt...
Grid current-feedback active damping for lcl resonance in grid-connected volt...
LeMeniz Infotech
 
Delay dependent stability of single-loop controlled grid-connected inverters ...
Delay dependent stability of single-loop controlled grid-connected inverters ...Delay dependent stability of single-loop controlled grid-connected inverters ...
Delay dependent stability of single-loop controlled grid-connected inverters ...
LeMeniz Infotech
 
Connection of converters to a low and medium power dc network using an induct...
Connection of converters to a low and medium power dc network using an induct...Connection of converters to a low and medium power dc network using an induct...
Connection of converters to a low and medium power dc network using an induct...
LeMeniz Infotech
 
Stamp enabling privacy preserving location proofs for mobile users
Stamp enabling privacy preserving location proofs for mobile usersStamp enabling privacy preserving location proofs for mobile users
Stamp enabling privacy preserving location proofs for mobile users
LeMeniz Infotech
 
Read2 me a cloud based reading aid for the visually impaired
Read2 me a cloud based reading aid for the visually impairedRead2 me a cloud based reading aid for the visually impaired
Read2 me a cloud based reading aid for the visually impaired
LeMeniz Infotech
 
Privacy preserving location sharing services for social networks
Privacy preserving location sharing services for social networksPrivacy preserving location sharing services for social networks
Privacy preserving location sharing services for social networks
LeMeniz Infotech
 
Pass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwordsPass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwords
LeMeniz Infotech
 
Eplq efficient privacy preserving location-based query over outsourced encryp...
Eplq efficient privacy preserving location-based query over outsourced encryp...Eplq efficient privacy preserving location-based query over outsourced encryp...
Eplq efficient privacy preserving location-based query over outsourced encryp...
LeMeniz Infotech
 
Analyzing ad library updates in android apps
Analyzing ad library updates in android appsAnalyzing ad library updates in android apps
Analyzing ad library updates in android apps
LeMeniz Infotech
 
An exploration of geographic authentication scheme
An exploration of geographic authentication schemeAn exploration of geographic authentication scheme
An exploration of geographic authentication scheme
LeMeniz Infotech
 
Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017
Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017
Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017
LeMeniz Infotech
 
Context based access control systems for mobile devices
Context based access control systems for mobile devicesContext based access control systems for mobile devices
Context based access control systems for mobile devices
LeMeniz Infotech
 

More from LeMeniz Infotech (20)

A fast acquisition all-digital delay-locked loop using a starting-bit predict...
A fast acquisition all-digital delay-locked loop using a starting-bit predict...A fast acquisition all-digital delay-locked loop using a starting-bit predict...
A fast acquisition all-digital delay-locked loop using a starting-bit predict...
 
A fast fault tolerant architecture for sauvola local image thresholding algor...
A fast fault tolerant architecture for sauvola local image thresholding algor...A fast fault tolerant architecture for sauvola local image thresholding algor...
A fast fault tolerant architecture for sauvola local image thresholding algor...
 
A dynamically reconfigurable multi asip architecture for multistandard and mu...
A dynamically reconfigurable multi asip architecture for multistandard and mu...A dynamically reconfigurable multi asip architecture for multistandard and mu...
A dynamically reconfigurable multi asip architecture for multistandard and mu...
 
Interleaved digital power factor correction based on the sliding mode approach
Interleaved digital power factor correction based on the sliding mode approachInterleaved digital power factor correction based on the sliding mode approach
Interleaved digital power factor correction based on the sliding mode approach
 
Bumpless control for reduced thd in power factor correction circuits
Bumpless control for reduced thd in power factor correction circuitsBumpless control for reduced thd in power factor correction circuits
Bumpless control for reduced thd in power factor correction circuits
 
A bidirectional single stage three phase rectifier with high-frequency isolat...
A bidirectional single stage three phase rectifier with high-frequency isolat...A bidirectional single stage three phase rectifier with high-frequency isolat...
A bidirectional single stage three phase rectifier with high-frequency isolat...
 
A bidirectional three level llc resonant converter with pwam control
A bidirectional three level llc resonant converter with pwam controlA bidirectional three level llc resonant converter with pwam control
A bidirectional three level llc resonant converter with pwam control
 
Efficient single phase transformerless inverter for grid tied pvg system with...
Efficient single phase transformerless inverter for grid tied pvg system with...Efficient single phase transformerless inverter for grid tied pvg system with...
Efficient single phase transformerless inverter for grid tied pvg system with...
 
Grid current-feedback active damping for lcl resonance in grid-connected volt...
Grid current-feedback active damping for lcl resonance in grid-connected volt...Grid current-feedback active damping for lcl resonance in grid-connected volt...
Grid current-feedback active damping for lcl resonance in grid-connected volt...
 
Delay dependent stability of single-loop controlled grid-connected inverters ...
Delay dependent stability of single-loop controlled grid-connected inverters ...Delay dependent stability of single-loop controlled grid-connected inverters ...
Delay dependent stability of single-loop controlled grid-connected inverters ...
 
Connection of converters to a low and medium power dc network using an induct...
Connection of converters to a low and medium power dc network using an induct...Connection of converters to a low and medium power dc network using an induct...
Connection of converters to a low and medium power dc network using an induct...
 
Stamp enabling privacy preserving location proofs for mobile users
Stamp enabling privacy preserving location proofs for mobile usersStamp enabling privacy preserving location proofs for mobile users
Stamp enabling privacy preserving location proofs for mobile users
 
Read2 me a cloud based reading aid for the visually impaired
Read2 me a cloud based reading aid for the visually impairedRead2 me a cloud based reading aid for the visually impaired
Read2 me a cloud based reading aid for the visually impaired
 
Privacy preserving location sharing services for social networks
Privacy preserving location sharing services for social networksPrivacy preserving location sharing services for social networks
Privacy preserving location sharing services for social networks
 
Pass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwordsPass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwords
 
Eplq efficient privacy preserving location-based query over outsourced encryp...
Eplq efficient privacy preserving location-based query over outsourced encryp...Eplq efficient privacy preserving location-based query over outsourced encryp...
Eplq efficient privacy preserving location-based query over outsourced encryp...
 
Analyzing ad library updates in android apps
Analyzing ad library updates in android appsAnalyzing ad library updates in android apps
Analyzing ad library updates in android apps
 
An exploration of geographic authentication scheme
An exploration of geographic authentication schemeAn exploration of geographic authentication scheme
An exploration of geographic authentication scheme
 
Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017
Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017
Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017
 
Context based access control systems for mobile devices
Context based access control systems for mobile devicesContext based access control systems for mobile devices
Context based access control systems for mobile devices
 

Recently uploaded

1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 

Recently uploaded (20)

1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 

Sbvlc secure barcode based visible light communication for smartphones

  • 1. The Master of IEEE Projects Copyright © 2015 LeMeniz Infotech. All rights reserved Page number 1 IEEE Master 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com SBVLC: Secure Barcode-based Visible Light Communication for Smartphones Abstract : 2D barcodes have enjoyed a significant penetration rate in mobile applications. This is largely due to the extremely low barrier to adoption – almost every camera- enabled smartphone can scan 2D barcodes. As an alternative to NFC technology, 2D barcodes have been increasingly used for security-sensitive mobile applications including mobile payments and personal identification. However, the security of barcode-based communication in mobile applications has not been systematically studied. Due to the visual nature, 2D barcodes are subject to eavesdropping when they are displayed on the smartphone screens. On the other hand, the fundamental design principles of 2D barcodes make it difficult to add security features. In this paper, we propose SBVLC - a secure system for barcode-based visible light communication (VLC) between smartphones. We formally analyze the security of SBVLC based on geometric models and propose physical security enhancement mechanisms for barcode communication by manipulating screen view angles and leveraging user-induced motions. We then develop three secure data exchange schemes that encode information in barcode streams. These schemes are useful in many security-sensitive mobile applications including private information sharing,
  • 2. The Master of IEEE Projects Copyright © 2015 LeMeniz Infotech. All rights reserved Page number 2 IEEE Master 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com secure device pairing, and contactless payment. SBVLC is evaluated through xtensive experiments on both Android and iOS smartphones. Existing system: Existing barcode applications are based on a single barcode exchange, which is insufficient to establish a secure communication channel. Recently, several systems are designed to stream a series of barcodes between a LCD screen and smartphone camera. These systems can enable high-throughput ad hoc communication between smartphones without relying on the Internet connectivity. However, they are designed based on highly customized barcodes which are not widely adopted in practice .Disadvantage : The security of barcode-based communication in mobile applications has not been systematically studied. Due to the visual nature, 2D barcodes are subject to eavesdropping when they are displayed on the smartphone screens
  • 3. The Master of IEEE Projects Copyright © 2015 LeMeniz Infotech. All rights reserved Page number 3 IEEE Master 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com  Above Diagram represent System Architecture Proposed system: In this paper, we propose SBVLC (Secure Barcode-based Visible Light Communication) – a novel secure ad-hoc wireless communication system for smartphones. Unlike NFC, SBVLC can be widely adopted by most off-the-shelf smartphones. It works across various smartphone platforms equipped with a color screen and a front-facing camera. Our system can also be easily extended to support other mobile and portable devices such as laptops and tablets. We use rigorous 2D and 3D geometric models to thoroughly examine the security of the proposed system. To the best of our knowledge, this work is the first that focuses on modelling and analyzing the security of VLC channel and barcode-based communication between smartphones. Specifically, we first design a real-time duplex screen-camera VLC channel based on 2D barcode streaming. By
  • 4. The Master of IEEE Projects Copyright © 2015 LeMeniz Infotech. All rights reserved Page number 4 IEEE Master 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com embedding extra information into the color of Quick Response (QR) codes, we developed a fast QR filtering technique to quickly remove the non-QR and duplicate QR frame images.propose Mobile phones are one of the most commonly used electronic gadgets today. Here, we intend to develop a modular and friendly application using cloud based OCR platform and the built in Android TTS for producing an audible result of the text file. Advantages:  Two-phase message transfer scheme  Smartphone handshake scheme  All-or-nothing data streaming scheme Conclusion : We proposed SBVLC, utilizing a fully duplex smartphone VLC channel based on 2D barcode. On top of the duplex VLC channel, we further propose three secure communication schemes. All SBVLC schemes are evaluated through extensive experiments on Android smartphones, and the results show that our system achieves high level security and NFC-comparable throughput. The system can be used for private information sharing, secure device pairing and secure mobile
  • 5. The Master of IEEE Projects Copyright © 2015 LeMeniz Infotech. All rights reserved Page number 5 IEEE Master 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com payment, etc. To our best knowledge, this work is the first one that formally defines and studies the security of a smartphone VLC system. It serves as a milestone for further development in secure VLC systems for smartphones. In future work, we would like to increase the system throughput, using color barcode streaming as discussed in. We will also extend our system to support other mobile and portable devices, e.g. laptops and tablets. Hardware Specification :  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech  Ram : 512 Mb.  MOBILE : ANDROID Software Specification :  Operating system : Windows 7.  Coding Language : Java 1.7  Tool Kit : Android 2.3 ABOVE
  • 6. The Master of IEEE Projects Copyright © 2015 LeMeniz Infotech. All rights reserved Page number 6 IEEE Master 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com  IDE : Android Studio Reference : *1+ B. Zhang, K. Ren, G. Xing, X. Fu, and C. Wang, “SBVLC: secure barcode-based visible light communication for smartphones,” in IEEE Conference INFOCOM 2014, 2014, pp. 2661–2669. *2+ L. Francis, G. Hancke, K. Mayes, and K. Markantonakis, “Practical relay attack on contactless transactions by using nfc mobile phones,” ePrint Archive, Report 2011/618, 2011. *3+ M. Allah, “Strengths and weaknesses of near field communication (nfc) technology,” GJCST, vol. 11, no. 3, 2011. [4] Barcode payment service, http://gigaom.com/2012/05/30/paypal-rollsout- barcode-payments-in-the-uk/. *5+ T. Langlotz and O. Bimber, “Unsynchronized 4d barcodes: coding and decoding time-multiplexed 2d colorcodes,” in ISVC, 2007.