IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Effectiveness of various user authentication techniquesIAEME Publication
This document discusses and compares various user authentication techniques. It analyzes one-time password authentication using smart phones (oPass), 3D password authentication using a virtual environment, and smart card-based authentication. oPass requires the user to remember only a long-term password for their phone, while the website generates one-time passwords via SMS. 3D passwords combine multiple authentication methods by having users navigate and interact with virtual objects. Smart card authentication does not store passwords in verification tables and allows password changes for mutual authentication. The document examines the advantages and disadvantages of these approaches.
A novel multifactor authentication system ensuring usability and securityijsptm
User authentication is one of the most important part of information security. Computer security most
commonly depends on passwords to authenticate human users. Password authentication systems will be
either been usable but not secure, or secure but not usable. While there are different types of authentication
systems available alphanumeric password is the most commonly used authentication mechanism. But this
method has significant drawbacks. An alternative solution to the text based authentication is Graphical
User Authentication based on the fact that humans tends to remember images better than text. Graphical
password authentication systems provide passwords which are easy to be created and remembered by the
user. However, the main issues of simple graphical password techniques are shoulder surfing attack and
image gallery attack. Studies reveals that most of the graphical passwords are either secure but not usable
or usable but not secure. . In this paper, a new technique that uses cued click point graphical password
method along with the use of one-time session key is proposed. The goal is to propose a new authentication
mechanism using graphical password to achieve higher security and better usability levels. The result of
the system testing is evaluated and it reveals that the proposed system ensures security and usability to a
great extent.
This document describes a proposed framework for e-iris enrollment and authentication to be incorporated into financial sector applications. The framework consists of two main modules: e-enrollment, which involves registering users' iris biometrics through a Java interface, and e-authentication, which authenticates users by scanning and matching their iris features. Key steps in the framework include iris image acquisition, preprocessing, feature extraction and encryption. The goal is to authenticate authorized users to different application functions based on access levels, while addressing issues like image quality and distance variations during enrollment. Implementation results demonstrating the framework's use for internet and mobile banking are also discussed.
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)CSCJournals
Smart devices are equipped with multiple authentication techniques and still remain prone to
attacks since all of these techniques require explicit user intervention. The purpose of this paper
is to capture the user behavior in order to use it as an implicit authentication technique.
In this paper, we introduce a novel authentication model to be used complementary to the
existing models; Particularly, the context of the user, the duration of usage of each application
and the occurrence time were examined and modeled using the cubic spline function as an
authentication technique. A software system composed of two software components has been
implemented on Android platform. Preliminary results show a 76% accuracy rate in determining
the rightful owner of the device.
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?Kavika Roy
1. Facial recognition technology works by identifying 80 nodal points on a human face and mapping variables like nose length, eye size, and cheekbone shape to create a unique "faceprint".
2. It can quickly and reliably recognize individuals when conditions are optimal, but performance decreases if the face is blurred, in shadow, or not facing forward.
3. Facial recognition is used for smartphone security like Face ID, airport security, law enforcement matching mugshots to databases, social media tagging photos, and targeted digital advertising based on demographics.
An Efficient User VErification System via Mouse MovementsOuzza Brahim
This document presents a new user verification system based on mouse movement biometrics. The system uses fine-grained angle-based metrics to characterize users' mouse movements. It then employs support vector machines to accurately and quickly verify users based on these mouse movement patterns. Experiments on over 1,000 users showed the system can verify a user within a few mouse clicks with high accuracy, making it suitable for online user verification. The key innovation is the use of angle-based metrics capturing the point-by-point direction and curvature of mouse movements.
This document describes the development of an Android mobile application called E-Sara. E-Sara provides students and staff of a college access to various institutional information through their smartphones. It allows users to view academic details, placement information, notices, and more. The application also has a student corner where students can upload their work and talents. In addition, it notifies users of upcoming library due dates to avoid late fees. The application aims to make college information more easily and conveniently accessible compared to traditional websites or notice boards. It was developed using Android Studio and has modules for login, training/placement, academics, updates, student corner, and library notifications.
Database Security Two Way Authentication Using Graphical PasswordIJERA Editor
As data represent a key asset for today's organizations. The problem is that how to protect this data from
attackers, theft and misuse is at the forefront of any organization’s mind. Even though today several data
security techniques are available to protect database and computing infrastructure, many such as network
security and firewalls tools are unable to prevent attacks from insider. Insider is a person working in
organization who can try to access the sensitive data. This paper proposes a two-way authentication method
which fuses knowledge-based secret and personal trait information.
Effectiveness of various user authentication techniquesIAEME Publication
This document discusses and compares various user authentication techniques. It analyzes one-time password authentication using smart phones (oPass), 3D password authentication using a virtual environment, and smart card-based authentication. oPass requires the user to remember only a long-term password for their phone, while the website generates one-time passwords via SMS. 3D passwords combine multiple authentication methods by having users navigate and interact with virtual objects. Smart card authentication does not store passwords in verification tables and allows password changes for mutual authentication. The document examines the advantages and disadvantages of these approaches.
A novel multifactor authentication system ensuring usability and securityijsptm
User authentication is one of the most important part of information security. Computer security most
commonly depends on passwords to authenticate human users. Password authentication systems will be
either been usable but not secure, or secure but not usable. While there are different types of authentication
systems available alphanumeric password is the most commonly used authentication mechanism. But this
method has significant drawbacks. An alternative solution to the text based authentication is Graphical
User Authentication based on the fact that humans tends to remember images better than text. Graphical
password authentication systems provide passwords which are easy to be created and remembered by the
user. However, the main issues of simple graphical password techniques are shoulder surfing attack and
image gallery attack. Studies reveals that most of the graphical passwords are either secure but not usable
or usable but not secure. . In this paper, a new technique that uses cued click point graphical password
method along with the use of one-time session key is proposed. The goal is to propose a new authentication
mechanism using graphical password to achieve higher security and better usability levels. The result of
the system testing is evaluated and it reveals that the proposed system ensures security and usability to a
great extent.
This document describes a proposed framework for e-iris enrollment and authentication to be incorporated into financial sector applications. The framework consists of two main modules: e-enrollment, which involves registering users' iris biometrics through a Java interface, and e-authentication, which authenticates users by scanning and matching their iris features. Key steps in the framework include iris image acquisition, preprocessing, feature extraction and encryption. The goal is to authenticate authorized users to different application functions based on access levels, while addressing issues like image quality and distance variations during enrollment. Implementation results demonstrating the framework's use for internet and mobile banking are also discussed.
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)CSCJournals
Smart devices are equipped with multiple authentication techniques and still remain prone to
attacks since all of these techniques require explicit user intervention. The purpose of this paper
is to capture the user behavior in order to use it as an implicit authentication technique.
In this paper, we introduce a novel authentication model to be used complementary to the
existing models; Particularly, the context of the user, the duration of usage of each application
and the occurrence time were examined and modeled using the cubic spline function as an
authentication technique. A software system composed of two software components has been
implemented on Android platform. Preliminary results show a 76% accuracy rate in determining
the rightful owner of the device.
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?Kavika Roy
1. Facial recognition technology works by identifying 80 nodal points on a human face and mapping variables like nose length, eye size, and cheekbone shape to create a unique "faceprint".
2. It can quickly and reliably recognize individuals when conditions are optimal, but performance decreases if the face is blurred, in shadow, or not facing forward.
3. Facial recognition is used for smartphone security like Face ID, airport security, law enforcement matching mugshots to databases, social media tagging photos, and targeted digital advertising based on demographics.
An Efficient User VErification System via Mouse MovementsOuzza Brahim
This document presents a new user verification system based on mouse movement biometrics. The system uses fine-grained angle-based metrics to characterize users' mouse movements. It then employs support vector machines to accurately and quickly verify users based on these mouse movement patterns. Experiments on over 1,000 users showed the system can verify a user within a few mouse clicks with high accuracy, making it suitable for online user verification. The key innovation is the use of angle-based metrics capturing the point-by-point direction and curvature of mouse movements.
This document describes the development of an Android mobile application called E-Sara. E-Sara provides students and staff of a college access to various institutional information through their smartphones. It allows users to view academic details, placement information, notices, and more. The application also has a student corner where students can upload their work and talents. In addition, it notifies users of upcoming library due dates to avoid late fees. The application aims to make college information more easily and conveniently accessible compared to traditional websites or notice boards. It was developed using Android Studio and has modules for login, training/placement, academics, updates, student corner, and library notifications.
Database Security Two Way Authentication Using Graphical PasswordIJERA Editor
As data represent a key asset for today's organizations. The problem is that how to protect this data from
attackers, theft and misuse is at the forefront of any organization’s mind. Even though today several data
security techniques are available to protect database and computing infrastructure, many such as network
security and firewalls tools are unable to prevent attacks from insider. Insider is a person working in
organization who can try to access the sensitive data. This paper proposes a two-way authentication method
which fuses knowledge-based secret and personal trait information.
Securing mobile cloud using finger print authenticationIJNSA Journal
The document summarizes a research paper that proposes using fingerprint recognition for user authentication in mobile cloud computing. It introduces mobile cloud computing and the need to improve security by strengthening authentication methods. The proposed approach uses a mobile phone's camera to capture fingerprint images for authentication instead of additional hardware. The algorithm extracts features from captured images and matches them to stored templates. Experimental results on different mobile devices found processing times below standards. The solution was concluded to enhance mobile cloud security through accessible and cross-platform fingerprint authentication.
A privacy learning objects identity system for smartphones based on a virtu...ijcsit
Smartphones are widely used today, with many features such as GPS map navigation, capturing
photos with camera equipment such as digital camera, internet connection via wifi or 3G devices that
function as computers. These devices are being used for various purposes including online learning, where
learners can study from anywhere and anytime for example in the street, home, office and school. However,
identifing a method by which teachers in these virtural environements can remember their learners “faces”
in the classroom or manage "Identification Number Student" (ID student or user) is not reliable when the
teacher cannot see all of the learners in the class or know who is online from a particular account. In this
paper, we propose a system, Android Virtual Learner Identify (AVLI), which collects images captured by
the face of the learning object directly from the camera, the location of the learner by identifing where the
learner is studying and configuration of information including Time, Mac, IP addresses, IMEI number and
location via GPS. The systen then saves learner profiles to help the teacher or education managers on the
Virtual Learning Environment (VLE) identify learning object. We used the VLE that we built on
mobile.ona.vn domain. We implemented the AVLI prototype Android phone with solution password
encryption and images taken directly from the camera to ensure that the information is transmitted and
stored securely in the Virtual Learning Environment System Database (VLE Data) of learning objects while
preserving the ability to identify learning objects by a teacher or education manager.
Green Armor Solutions offers Identity Cues Two Factor, a two-factor authentication system that provides maximum security and convenience. It delivers true two-factor authentication without relying on password resets or software downloads. Identity Cues Two Factor also uniquely provides two-way authentication by using visual cues to inform users whether they are interacting with a legitimate website or a criminal clone. As the most user-friendly two-factor system, it typically requires no extra steps or user training during login.
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...IRJET Journal
1. The document proposes a two-factor authentication system using smartwatches. It aims to provide a more convenient authentication method compared to existing SMS/email-based systems.
2. The proposed system uses smartwatch notifications and a 4-digit PIN entered on the smartwatch for two-factor authentication. When a user logs in, their smartwatch receives a notification and prompts them to enter their PIN.
3. The system is designed to be faster and less cumbersome than traditional two-factor authentication methods. By leveraging growing smartwatch usage, it could provide more secure authentication across multiple user accounts and services.
A Smart Receptionist Implementing Facial Recognition and Voice InteractionCSCJournals
The purpose of this research is to implement a smart receptionist system with facial recognition and voice interaction using deep learning. The facial recognition component is implemented using real time image processing techniques, and it can be used to learn new faces as well as detect and recognize existing faces. The first time a customer uses this system, it will take the person’s facial data to create a unique user facial model, and this model will be triggered if the person comes the second time. The recognition is done in real time and after which voice interaction will be applied. Voice interaction is used to provide a life-like human communication and improve user experience. Our proposed smart receptionist system could be integrated into the self check-in kiosks deployed in hospitals or smart buildings to streamline the user recognition process and provide customized user interactions. This system could also be used in smart home environment where smart cameras have been deployed and voice assistants are in place.
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
This document summarizes a research paper about developing an authentication system for banking using implicit passwords. The proposed system uses randomly generated security questions to authenticate users, with answers provided as clickable points on an image instead of text. If the user correctly identifies the points associated with the security question, they are authenticated. The system aims to improve security over traditional username/password schemes while maintaining usability on mobile devices. Key modules described include user profile creation, generation of random authentication questions, comparing login profiles to verify identity, and allowing transactions and balance checks via SMS.
Smartphone is one of the important assets of today’s generation it makes people more responsive, productive and effective in work and in personal dealings. Remarkably it is used as the primary repository of individual confidential files because of its portability and reliability which provide a scheme to smartphone companies to embed security features and users install security application freely available in the market. In most various studies, facial recognition marked the highest security features. So, this study aims to develop a facial recognition application specifically for an android phone using a local binary histogram algorithm and V-Model to process the development of the application. Furthermore, this application is tested and evaluated by the experts with a score of 4.59 weighted mean “Excellent” based on its functionality, reliability, usability, efficiency and portability.
ipas implicit password authentication system ieee 2011prasanna9
This document summarizes a proposed authentication system called the Implicit Password Authentication System (IPAS). IPAS aims to address weaknesses in existing authentication schemes like passwords, tokens, biometrics and graphical passwords. It proposes using a set of questions and answers during registration that are then implicitly embedded into images by the server during authentication. The server randomly selects questions and images, requiring the user to demonstrate knowledge of their prior answers without directly reproducing them. The system is intended for mobile banking but could generalize to other client-server environments.
IRJET- Phishing Attack based on Visual CryptographyIRJET Journal
This document proposes a novel anti-phishing framework based on visual cryptography to address the problem of phishing. It involves using an image-based authentication with visual cryptography. When a user registers, an image captcha is selected and decomposed into two shares - one stored with the user and one with the server. This prevents either party from seeing the full captcha alone. When logging in, the shares are combined to reveal the original captcha image for the user to enter as a password. This allows the user to verify the authenticity of the website before entering credentials, protecting against phishing attacks. The proposed system aims to improve online security for tasks like corporate elections that currently require in-person voting.
IRJET- Bus Monitoring System using Android ApplicationIRJET Journal
The document proposes a bus monitoring system using an Android application that allows users to track buses in real-time on a map, view arrival and departure times at stops, and see the live location and route of buses. It discusses the existing problems with public transportation and how the proposed system would allow users to more efficiently plan their journeys and reduce time wasted waiting for buses. The system is intended to be implemented using GPS tracking on buses along with an Android app and website interfaces for users.
Information security plays an important role in
governments. Its realm has been increased nowadays, especially
with resent viruses’ attacks in different governmental
organizations. The authentication is aspect of information
security, its current scheme used nowadays in the systems is
depend on the login by user name and password in addition to
one-time password or traditional secret questions, which in turn
is usually easy to predicate. This paper proposes enhanced
knowledge based authentication solution which ensures and
provides more security and usability levels for governmental
organizations.
This document summarizes a research paper that introduces a novel approach to bypass modern face authentication systems using virtual reality. Specifically, the researchers show that by leveraging a handful of publicly available photos of a target user, they can create a realistic 3D facial model that undermines the security of widely used face authentication solutions. Their framework uses VR systems to display the synthetic facial model, along with animations like smiling or eyebrow raising, in order to trick liveness detectors. They conduct experiments demonstrating that their approach is able to undermine the security of several commercial face authentication systems.
Comparative Study on Intrusion Detection Systems for Smartphonesiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
GROUP MEMBER :
MOHD.AIRIL SOLEHAN BIN JOHARI 043911
MUHAMMAD AIMAN BIN ABD GHANI 043959
MUHAMMAD NAUFAL BIN FARID 043953
MUHAMMAD NURAZRUL AMRI BIN NOOR AZLAN 044416
MUHAMMAD NUR ATHARI BI SHAFIEE 044439
3D Face Recognition Technology in Network Security ApplicationsIRJET Journal
This document discusses 3D face recognition technology and its applications for network security. It begins by describing the limitations of traditional 2D face recognition, such as being affected by changes in lighting, pose, and facial expressions. 3D face recognition uses depth information and is pose invariant. It extracts distinctive facial features like depth of the nose, eye sockets, and chin. The document then covers the working of a 3D face recognition system including detection, alignment, measurement, representation, matching, and verification steps. Finally, it analyzes different algorithms used for face recognition, including Principal Component Analysis (PCA), Discrete Cosine Transform (DCT), and Linear Discriminant Analysis (LDA).
This paper discusses the architecture behind Securly’s DNS-based filtering solution, currently making over 3 million US students safer. The steps for configuring a school network to use Securly’s DNS-based filtering solution are laid out. Additionally, included statistics provide evidence of lives saved and bullying incidents mitigated as a result of these solutions.
User Experience Portfolio. Sushmita DuttSushmita Dutt
A Portfolio of User Experience and Information Architecture work delivered to Global, Multinational companies for Digital Technology Products and Services. All rights reserved.
Instant Messaging (IM) Android applications are a trend nowadays. These applications are categorized according to their features: usability, flexibility, privacy and security. However, IM applications tend to be inflexible in terms of functionality offered. The “Dble-U” system was developed as a solution to this inflexibility, with a focus on privacy as an example use case. “Dble-U” is a configurable modular system consisting of an Android chatting application, a privacy controller application, along with a tracking server application. This modularity allows for groups of individuals to build custom features into their IM application.
11.graphical password based hybrid authentication system for smart hand held ...Alexander Decker
Ray's Scheme is a proposed hybrid graphical password authentication system for smart handheld devices. The system combines recognition and recall-based techniques and has two phases: registration and authentication. During registration, the user selects a username, textual password, and graphical password by choosing objects and corresponding digits. During authentication, the user enters their username, password, and recalls the graphical password by selecting the objects and entering the digits. The system aims to provide more security while being user-friendly for smart devices.
Android Based Total Security for System AuthenticationIJERA Editor
In this Paper [5], A highly severe menace to any computing device is the impersonation of an authenticate user. The most frequent computer authentication scheme is to use alphanumerical usernames and passwords. But the textual passwords are prone to dictionary attacks, eves dropping, shoulder surfing and social engineering. As such, graphical passwords have been introduced as an alternative to the traditional authentication process. Though the graphical password schemes provide a way of making more user friendly passwords, while increasing the level of security, they are vulnerable to shoulder surfing. To address this problem, text can be used in combination with the colors and images to generate the session passwords, thereby making a stronger authentication means. In general, session passwords are those that can be used only once and for every new session, a new password is engendered. This paper [7] describes a method of implementing two factor authentication using mobile phones. The proposed method guarantees that authenticating to services, such as online banking or ATM machines, is done in a very secure manner. The proposed system involves using a mobile phone as a software token for One Time Password generation. The generated One Time Password is valid for only a short user defined period of time and is generated by factors that are unique to both, the user and the mobile device itself. Additionally, an SMS-based mechanism is implemented as both a backup mechanism for retrieving the password and as a possible mean of synchronization. The proposed method has been implemented and tested. Initial results show the success of the proposed method.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Securing mobile cloud using finger print authenticationIJNSA Journal
The document summarizes a research paper that proposes using fingerprint recognition for user authentication in mobile cloud computing. It introduces mobile cloud computing and the need to improve security by strengthening authentication methods. The proposed approach uses a mobile phone's camera to capture fingerprint images for authentication instead of additional hardware. The algorithm extracts features from captured images and matches them to stored templates. Experimental results on different mobile devices found processing times below standards. The solution was concluded to enhance mobile cloud security through accessible and cross-platform fingerprint authentication.
A privacy learning objects identity system for smartphones based on a virtu...ijcsit
Smartphones are widely used today, with many features such as GPS map navigation, capturing
photos with camera equipment such as digital camera, internet connection via wifi or 3G devices that
function as computers. These devices are being used for various purposes including online learning, where
learners can study from anywhere and anytime for example in the street, home, office and school. However,
identifing a method by which teachers in these virtural environements can remember their learners “faces”
in the classroom or manage "Identification Number Student" (ID student or user) is not reliable when the
teacher cannot see all of the learners in the class or know who is online from a particular account. In this
paper, we propose a system, Android Virtual Learner Identify (AVLI), which collects images captured by
the face of the learning object directly from the camera, the location of the learner by identifing where the
learner is studying and configuration of information including Time, Mac, IP addresses, IMEI number and
location via GPS. The systen then saves learner profiles to help the teacher or education managers on the
Virtual Learning Environment (VLE) identify learning object. We used the VLE that we built on
mobile.ona.vn domain. We implemented the AVLI prototype Android phone with solution password
encryption and images taken directly from the camera to ensure that the information is transmitted and
stored securely in the Virtual Learning Environment System Database (VLE Data) of learning objects while
preserving the ability to identify learning objects by a teacher or education manager.
Green Armor Solutions offers Identity Cues Two Factor, a two-factor authentication system that provides maximum security and convenience. It delivers true two-factor authentication without relying on password resets or software downloads. Identity Cues Two Factor also uniquely provides two-way authentication by using visual cues to inform users whether they are interacting with a legitimate website or a criminal clone. As the most user-friendly two-factor system, it typically requires no extra steps or user training during login.
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...IRJET Journal
1. The document proposes a two-factor authentication system using smartwatches. It aims to provide a more convenient authentication method compared to existing SMS/email-based systems.
2. The proposed system uses smartwatch notifications and a 4-digit PIN entered on the smartwatch for two-factor authentication. When a user logs in, their smartwatch receives a notification and prompts them to enter their PIN.
3. The system is designed to be faster and less cumbersome than traditional two-factor authentication methods. By leveraging growing smartwatch usage, it could provide more secure authentication across multiple user accounts and services.
A Smart Receptionist Implementing Facial Recognition and Voice InteractionCSCJournals
The purpose of this research is to implement a smart receptionist system with facial recognition and voice interaction using deep learning. The facial recognition component is implemented using real time image processing techniques, and it can be used to learn new faces as well as detect and recognize existing faces. The first time a customer uses this system, it will take the person’s facial data to create a unique user facial model, and this model will be triggered if the person comes the second time. The recognition is done in real time and after which voice interaction will be applied. Voice interaction is used to provide a life-like human communication and improve user experience. Our proposed smart receptionist system could be integrated into the self check-in kiosks deployed in hospitals or smart buildings to streamline the user recognition process and provide customized user interactions. This system could also be used in smart home environment where smart cameras have been deployed and voice assistants are in place.
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
This document summarizes a research paper about developing an authentication system for banking using implicit passwords. The proposed system uses randomly generated security questions to authenticate users, with answers provided as clickable points on an image instead of text. If the user correctly identifies the points associated with the security question, they are authenticated. The system aims to improve security over traditional username/password schemes while maintaining usability on mobile devices. Key modules described include user profile creation, generation of random authentication questions, comparing login profiles to verify identity, and allowing transactions and balance checks via SMS.
Smartphone is one of the important assets of today’s generation it makes people more responsive, productive and effective in work and in personal dealings. Remarkably it is used as the primary repository of individual confidential files because of its portability and reliability which provide a scheme to smartphone companies to embed security features and users install security application freely available in the market. In most various studies, facial recognition marked the highest security features. So, this study aims to develop a facial recognition application specifically for an android phone using a local binary histogram algorithm and V-Model to process the development of the application. Furthermore, this application is tested and evaluated by the experts with a score of 4.59 weighted mean “Excellent” based on its functionality, reliability, usability, efficiency and portability.
ipas implicit password authentication system ieee 2011prasanna9
This document summarizes a proposed authentication system called the Implicit Password Authentication System (IPAS). IPAS aims to address weaknesses in existing authentication schemes like passwords, tokens, biometrics and graphical passwords. It proposes using a set of questions and answers during registration that are then implicitly embedded into images by the server during authentication. The server randomly selects questions and images, requiring the user to demonstrate knowledge of their prior answers without directly reproducing them. The system is intended for mobile banking but could generalize to other client-server environments.
IRJET- Phishing Attack based on Visual CryptographyIRJET Journal
This document proposes a novel anti-phishing framework based on visual cryptography to address the problem of phishing. It involves using an image-based authentication with visual cryptography. When a user registers, an image captcha is selected and decomposed into two shares - one stored with the user and one with the server. This prevents either party from seeing the full captcha alone. When logging in, the shares are combined to reveal the original captcha image for the user to enter as a password. This allows the user to verify the authenticity of the website before entering credentials, protecting against phishing attacks. The proposed system aims to improve online security for tasks like corporate elections that currently require in-person voting.
IRJET- Bus Monitoring System using Android ApplicationIRJET Journal
The document proposes a bus monitoring system using an Android application that allows users to track buses in real-time on a map, view arrival and departure times at stops, and see the live location and route of buses. It discusses the existing problems with public transportation and how the proposed system would allow users to more efficiently plan their journeys and reduce time wasted waiting for buses. The system is intended to be implemented using GPS tracking on buses along with an Android app and website interfaces for users.
Information security plays an important role in
governments. Its realm has been increased nowadays, especially
with resent viruses’ attacks in different governmental
organizations. The authentication is aspect of information
security, its current scheme used nowadays in the systems is
depend on the login by user name and password in addition to
one-time password or traditional secret questions, which in turn
is usually easy to predicate. This paper proposes enhanced
knowledge based authentication solution which ensures and
provides more security and usability levels for governmental
organizations.
This document summarizes a research paper that introduces a novel approach to bypass modern face authentication systems using virtual reality. Specifically, the researchers show that by leveraging a handful of publicly available photos of a target user, they can create a realistic 3D facial model that undermines the security of widely used face authentication solutions. Their framework uses VR systems to display the synthetic facial model, along with animations like smiling or eyebrow raising, in order to trick liveness detectors. They conduct experiments demonstrating that their approach is able to undermine the security of several commercial face authentication systems.
Comparative Study on Intrusion Detection Systems for Smartphonesiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
GROUP MEMBER :
MOHD.AIRIL SOLEHAN BIN JOHARI 043911
MUHAMMAD AIMAN BIN ABD GHANI 043959
MUHAMMAD NAUFAL BIN FARID 043953
MUHAMMAD NURAZRUL AMRI BIN NOOR AZLAN 044416
MUHAMMAD NUR ATHARI BI SHAFIEE 044439
3D Face Recognition Technology in Network Security ApplicationsIRJET Journal
This document discusses 3D face recognition technology and its applications for network security. It begins by describing the limitations of traditional 2D face recognition, such as being affected by changes in lighting, pose, and facial expressions. 3D face recognition uses depth information and is pose invariant. It extracts distinctive facial features like depth of the nose, eye sockets, and chin. The document then covers the working of a 3D face recognition system including detection, alignment, measurement, representation, matching, and verification steps. Finally, it analyzes different algorithms used for face recognition, including Principal Component Analysis (PCA), Discrete Cosine Transform (DCT), and Linear Discriminant Analysis (LDA).
This paper discusses the architecture behind Securly’s DNS-based filtering solution, currently making over 3 million US students safer. The steps for configuring a school network to use Securly’s DNS-based filtering solution are laid out. Additionally, included statistics provide evidence of lives saved and bullying incidents mitigated as a result of these solutions.
User Experience Portfolio. Sushmita DuttSushmita Dutt
A Portfolio of User Experience and Information Architecture work delivered to Global, Multinational companies for Digital Technology Products and Services. All rights reserved.
Instant Messaging (IM) Android applications are a trend nowadays. These applications are categorized according to their features: usability, flexibility, privacy and security. However, IM applications tend to be inflexible in terms of functionality offered. The “Dble-U” system was developed as a solution to this inflexibility, with a focus on privacy as an example use case. “Dble-U” is a configurable modular system consisting of an Android chatting application, a privacy controller application, along with a tracking server application. This modularity allows for groups of individuals to build custom features into their IM application.
11.graphical password based hybrid authentication system for smart hand held ...Alexander Decker
Ray's Scheme is a proposed hybrid graphical password authentication system for smart handheld devices. The system combines recognition and recall-based techniques and has two phases: registration and authentication. During registration, the user selects a username, textual password, and graphical password by choosing objects and corresponding digits. During authentication, the user enters their username, password, and recalls the graphical password by selecting the objects and entering the digits. The system aims to provide more security while being user-friendly for smart devices.
Android Based Total Security for System AuthenticationIJERA Editor
In this Paper [5], A highly severe menace to any computing device is the impersonation of an authenticate user. The most frequent computer authentication scheme is to use alphanumerical usernames and passwords. But the textual passwords are prone to dictionary attacks, eves dropping, shoulder surfing and social engineering. As such, graphical passwords have been introduced as an alternative to the traditional authentication process. Though the graphical password schemes provide a way of making more user friendly passwords, while increasing the level of security, they are vulnerable to shoulder surfing. To address this problem, text can be used in combination with the colors and images to generate the session passwords, thereby making a stronger authentication means. In general, session passwords are those that can be used only once and for every new session, a new password is engendered. This paper [7] describes a method of implementing two factor authentication using mobile phones. The proposed method guarantees that authenticating to services, such as online banking or ATM machines, is done in a very secure manner. The proposed system involves using a mobile phone as a software token for One Time Password generation. The generated One Time Password is valid for only a short user defined period of time and is generated by factors that are unique to both, the user and the mobile device itself. Additionally, an SMS-based mechanism is implemented as both a backup mechanism for retrieving the password and as a possible mean of synchronization. The proposed method has been implemented and tested. Initial results show the success of the proposed method.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Secure intrusion detection and countermeasure selection in virtual system usi...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
The document discusses a study on the properties of banana fiber reinforced composites. Banana fibers were treated with sodium hydroxide and used to reinforce both epoxy and vinyl ester resin matrices. Coconut shell powder was also used along with the fibers. Various mechanical properties including tensile strength, flexural strength, and impact strength were tested for the untreated and treated fiber composites. The treated fiber composites showed improved mechanical properties compared to the untreated fibers due to better adhesion between the fiber and matrix. A hybrid composite containing both banana fiber and coconut shell powder showed higher strength values than the banana fiber only composite.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Mri image registration based segmentation framework for whole hearteSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Design and implementation of autonomous maneuvering robotic vehicle using glo...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document proposes a new method for handwritten character recognition that uses different recognition methods sequentially as filters. It begins by describing existing recognition methods like matrix matching, feature extraction, and neural networks. It then introduces three new methods: intersection count method, shape enclosed method, and centroid based method. These are combined and applied sequentially to the input as filters to recognize characters. At each step, the possible matches are reduced, improving efficiency over single methods. The method is described through an example recognizing the letter P. It shows how each step reduces the possible matches until a single character is identified. The document concludes the filter approach is more accurate and efficient than single complex methods.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Spatio temporal modeling of snow flake crystals using packard’s cellular auto...eSAT Publishing House
This document discusses using cellular automata to model the growth of snowflake crystals. It begins with background on cellular automata and how they can be applied to growth modeling. It then discusses the crystal structure of ice and how environmental conditions like temperature and humidity determine the shape of snowflake crystals. Cellular automata rules are developed to simulate snowflake growth on a hexagonal lattice, reproducing basic crystal forms like plates, dendrites, and sectors. In summary, cellular automata provide a way to model the spatial and temporal dynamics of snowflake crystal formation through simple local interaction rules.
An enhancing security for mobile sinks by providing location privacy in wsneSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Transparent Developmental Biometric Based System Protect User Reauthenticatio...IRJET Journal
The document presents a transparent developmental biometric-based system to protect user reauthentication using smartphones. It proposes a system called Safeguard that uses on-screen finger movements like sliding dynamics and pressure intensity as behavioral biometrics for accurate and efficient user verification. Safeguard first implements various machine learning approaches and selects support vector machine due to its high accuracy. It analyzes Safeguard's robustness against attacks and validates its efficacy through implementation on off-the-shelf smartphones with practical evaluation under different scenarios.
Cloud Service Security using Two-factor or Multi factor AuthenticationIRJET Journal
This document discusses implementing multi-factor authentication for cloud services using handwritten signatures and passwords. It proposes a system that uses behavioral biometrics (signatures) collected on mobile devices along with standard passwords. The system shifts computational tasks to a cloud-based server, allowing for platform-independent, ubiquitous two-factor authentication. The system was tested on iOS and Android apps connected to the cloud server, achieving 98.4% accuracy in signature verification.
IRJET- Eye Tracking for Password Authentication using Machine LearningIRJET Journal
This document presents an eye tracking system for password authentication using machine learning. It aims to overcome shoulder surfing attacks by allowing users to enter passwords using their eye movements instead of a keyboard. The system detects the user's eye pupil location using a Haar cascade algorithm and measures the distance between the eye center and pupil to determine if the user is looking left, right, or center. Numbers are displayed on screen and the user selects them by focusing on them with their eyes. The entered password is compared to a trained dataset and access is allowed only if it matches. This gaze-based authentication method leaves no trace of the password and makes it difficult for observers to steal authentication information through shoulder surfing.
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...ADEIJ Journal
Today, a large number of people access internet through their smart phones to login to their bank accounts, social networking accounts and various other blogs. In such a scenario, user authentication has emerged as a major security issue in mobile internet. To date, password based authentication schemes have been extensively used to provide authentication and security. The password based authentication has always been cumbersome for the users because human memory is transient and remembering a large number of long and complicated passwords is impossible. Also, it is vulnerable to various kinds of attacks like brute force, rainbow table, dictionary, sniffing, shoulder surfing and so on. As the main contribution of this paper, a new passwordless authentication scheme for smart phones is presented which not only resolves all the weaknesses of password based schemes but also provide robust security. The proposed scheme relieves users from memorizing and storing long and complicated passwords. The proposed scheme uses ECDSA which is based on Elliptic Curve Cryptography (ECC). ECC has remarkable strength and efficiency advantages in terms of bandwidth, key sizes and computational overheads over other public key cryptosystems. It is therefore suitable for resource constraint devices like smart phone. Furthermore, the proposed scheme incorporate CAPTCHA which play a very important role in protecting the web resources from spamming and other malicious activities. To the best of our knowledge, until now no passwordless user authentication protocol based on ECC has been proposed for smart phones. Finally, the security and functionality analysis shows that compared with existing password based authentication schemes, the proposed scheme is more secure and efficient.
Automated Media Player using Hand GestureIRJET Journal
The document describes an automated media player system that uses hand gestures for control. It uses machine learning algorithms and computer vision techniques to interpret hand gestures in real-time and respond by controlling media playback functions. The system aims to create a more intuitive user interface for media control without needing physical input devices. It has applications for home entertainment, public spaces, and assisting disabled users. The methodology involves collecting a dataset of hand gesture images, training a model like Squeezenet using Keras and TensorFlow, then using the trained model and PyAutoGUI to map recognized gestures to media control functions in real-time. Accuracy testing is done to evaluate the system's performance.
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...IRJET Journal
This document describes a proposed system for detecting and preventing app misbehavior on Android devices. It begins with an overview of existing approaches to identifying "zombie" apps that run in the background without user interaction. The proposed system would design multiple applications, including an antivirus-like app to monitor for misbehaviors like sending SMS messages, draining the battery, storing call logs in the cloud, and crashing the gallery. When misbehaviors are detected, the problematic apps would be quarantined with user acknowledgment. The system is intended to efficiently monitor app permissions and resource usage to identify zombie apps and prevent unwanted activities.
LUIS: A L IGHT W EIGHT U SER I DENTIFICATION S CHEME FOR S MARTPHONES IJCI JOURNAL
Smartphone usage has reached its peak. There has be
en a tremendous growth in the number of people
migrating from PCs to smart phones. Numerous scenar
ios such as loss of a phone, phone theft etc., can
lead to unauthorized use of one’s own smartphone. T
his raises the concern for securing personal and
private data. This project proposes a light weight
two level user identification scheme to recognize a
nd
authenticate the mobile phone based on the device h
olding and usage patterns. To validate the proposed
scheme, an application is created which takes a ges
ture input characterized by time of swiping the scr
een,
finger pressure, phone movements and location of sw
ipe on the screen through X and Y co-ordinate. A
threshold based matching scheme performs classifica
tion to find the true owner. Results show that the
scheme was able to achieve 90% true positives and 1
0% false positives with a 0.5% of battery usage.
Prediction Techniques in Internet of Things (IoT) Environment: A Comparative ...rahulmonikasharma
Socialization and Personalization in Internet of Things (IOT) environment are the current trends in computing research. Most of the research work stresses the importance of predicting the service & providing socialized and personalized services. This paper presents a survey report on different techniques used for predicting user intention in wide variety of IOT based applications like smart mobile, smart television, web mining, weather forecasting, health-care/medical, robotics, road-traffic, educational data mining, natural calamities, retail banking, e-commerce, wireless networks & social networking. As per the survey made the prediction techniques are used for: predicting the application that can be accessed by the mobile user, predicting the next page to be accessed by web user, predicting the users favorite TV program, predicting user navigational patterns and usage needs on websites & also to extract the users browsing behavior, predicting future climate conditions, predicting whether a patient is suffering from a disease, predicting user intention to make implicit and human-like interactions possible by accepting implicit commands, predicting the amount of traffic occurring at a particular location, predicting student performance in schools & colleges, predicting & estimating the frequency of natural calamities occurrences like floods, earthquakes over a long period of time & also to take precautionary measures, predicting & detecting false user trying to make transaction in the name of genuine user, predicting the actions performed by the user to improve the business, predicting & detecting the intruder acting in the network, predicting the mood transition information of the user by using context history, etc. This paper also discusses different techniques like Decision Tree algorithm, Artificial Intelligence and Data Mining based Machine learning techniques, Content and Collaborative based Recommender algorithms used for prediction.
User Interface Design for Web and Mobile DevicesIRJET Journal
The document discusses principles of user interface design for web and mobile devices. It outlines six main principles: structure, simplicity, visibility, feedback, tolerance, and reuse. It also covers considerations for user interface design like display size, input methods, operating system diversity, performance issues, and designing for multiple device usage. The key challenges are accounting for the wide variety of display sizes, input types, OS differences, and balancing capabilities and limitations across devices to provide a consistent user experience.
This document summarizes a research paper on M-Pass, a proposed user authentication protocol that aims to prevent password stealing and reuse attacks. M-Pass leverages cell phones and SMS to authenticate users on untrusted devices without requiring them to enter passwords. It involves a registration phase where users register with a website and encrypt a password with their phone number. For login, users provide their username and long-term phone password, and the website generates a one-time password using a secret credential. The protocol aims to eliminate the need to remember multiple passwords by using the phone for authentication across websites. Evaluation shows registration and login times average around 4 and 3.5 minutes respectively. The researchers conclude M-Pass can prevent password stealing and reuse
IRJET- The Usability of HCI in Smart HomeIRJET Journal
The document discusses the importance of usability and human-computer interaction (HCI) principles in the design of mobile applications for smart homes. It reviews previous literature on smart home and HCI design. The paper then proposes several usability principles that should be considered for mobile interfaces for smart homes, including emotional design, responsiveness, adaptability, safety, consistency, and allowing the interface to learn users' habits over time. It argues that following such principles can help create more intuitive and user-friendly interfaces that improve the usability of smart home systems and attract more users.
IRJET - Graphical Password Authentication for Banking SystemIRJET Journal
This document describes a proposed system for enhancing authentication security for banking transactions through the use of graphical passwords. The system uses a two-step verification process, with pass-point authentication to validate the user during login by requiring them to click on a sequence of points on an image. For transactions, a color palette technique is used where the user must enter a pin number by selecting the corresponding color pairs. The system aims to improve security over traditional text passwords and prevent fraud by automatically filing a complaint if unauthorized access is detected and notifying the user via mobile if a transaction is halted.
An Overview on Authentication Approaches and Their Usability in Conjunction w...IJERA Editor
The usage of sensitive online services and applications such as online banking, e-commerce etc is increasing day by day. These technologies have tremendously improved making our daily life easier. However, these developments have been accompanied by E-piracy where attackers try to get access to services illegally. As sensitive information flow through Internet, they need support for security properties such as authentication, authorization, data confidentiality. Perhaps static password (User ID & password) is the most common and widely accepted authentication method. Online applications need strong password such as a combination of alphanumeric with special characters. In general, having one password for a single service may be easy to remember, but controlling many passwords for different services poses a tedious task on users online applications . Usually users try to use same password for different services or make slight changes in the password which can be easy for attacker to guess adding increased security threat. In order to overcome this, stronger authentication solutions need to be suggested and adapted for services based network.
Mouse Cursor Control Hands Free Using Deep LearningIRJET Journal
1) The document presents a study on developing a mouse-free cursor control system using facial movements and deep learning.
2) The system uses facial landmark detection and analysis of facial ratios like eye aspect ratio and mouth aspect ratio to interpret facial expressions and predict cursor movement directions.
3) Support vector machines and histogram of oriented gradients algorithms are used to train the system to classify facial features and link them to cursor control functions like moving, clicking, and scrolling.
Mouse Cursor Control Hands Free Using Deep LearningIRJET Journal
1) The document presents a study on developing a mouse-free cursor control system using facial movements and deep learning.
2) The system uses facial landmark detection and analysis of facial ratios like eye aspect ratio and mouth aspect ratio to detect facial expressions and movements like winks, blinks, and mouth movements.
3) A support vector machine (SVM) classifier is trained on the facial features to predict and translate cursor movement directions based on the user's facial gestures, allowing them to control the cursor and perform actions hands-free.
IRJET- Finger Gesture Recognition Using Linear CameraIRJET Journal
This document describes a system for finger gesture recognition using a linear camera. The system aims to allow users to control basic computer functions through finger gestures as an alternative to using a mouse or keyboard. It works by using image processing techniques on video captured by the linear camera to detect the user's finger movements and map them to cursor movements or actions. The system is broken down into four main stages - skin detection to identify finger regions, finger contour extraction, finger tracking, and gesture recognition to identify gestures and map them to computer functions like play, pause, volume control etc. This vision-based approach allows for contactless control and could help users in situations where mouse or keyboard is unavailable.
This certificate from Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. certifies that a research paper titled "A Review on Virtual Dressing Room for E-Shopping using Augmented Reality" by Aleeza Shaikh, Prashant Shinde, Swapnil Chandra, Sandeep Singh, and Rubeena Khan was published in the International Journal of Soft Computing and Engineering in November 2014. The journal has an impact factor of 1.177. The certificate provides contact information for the journal.
The document describes a Virtual Smart Phone (VSP) that allows users to communicate and interact with digital devices and each other using hand gestures instead of a physical mobile phone. The VSP is a wearable device that uses projectors, cameras, sensors and cloud computing technology. It allows users to make calls, send messages, take photos/videos and transfer data between devices with hand gestures alone. The VSP aims to make digital interactions more natural and intuitive by replacing the physical mobile phone with virtual touch-based and gesture-based interactions on the user's hand.
This document describes a proposed voice-controlled e-commerce web application. It begins with an abstract that outlines using voice recognition to make online shopping more accessible. Then, it discusses the objectives of the application, which are to study limitations of existing e-commerce sites and allow full voice control. The proposed system is described as integrating speech recognition services to convert voice inputs to text and vice versa, along with keyword checking to understand commands. This would allow voice control of all shopping tasks rather than just search. The implementation details reducing load on the app by using external speech services and optimizing performance. Future work could include voice authentication and personalized recommendations.
The document describes a voice controlled news application that allows users to get news through voice commands instead of reading newspapers or articles. It discusses how the application was developed using tools like React, News API, Weather API, and Alan Studio's voice AI platform. The application provides news by category, source, country and search terms, as well as weather information, and users can interact with it on any device through simple voice commands.
Similar to Websites using touchless interaction having graphical (20)
Hudhud cyclone caused extensive damage in Visakhapatnam, India in October 2014, especially to tree cover. This will likely impact the local environment in several ways: increased air pollution as trees absorb less; higher temperatures without tree canopy; increased erosion and landslides. It also created large amounts of waste from destroyed trees. Proper management of solid waste is needed to prevent disease spread. Suggested measures include restoring damaged plants, building fountains to reduce heat, mandating light-colored buildings, improving waste management, and educating public on health risks. Overall, changes are needed to water, land, and waste practices to rebuild the environment after the cyclone removed green cover.
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
1) In September-October 2009, unprecedented heavy rainfall and dam releases caused widespread flooding in Alampur village in Mahabub Nagar district, a historically drought-prone area.
2) The flood damaged or destroyed homes, buildings, infrastructure, crops, and documents. It displaced many residents and cut off the village.
3) The socioeconomic conditions and mud-based construction of homes in the village exacerbated the flood's impacts, making damage more severe and recovery more difficult.
The document summarizes the Hudhud cyclone that struck Visakhapatnam, India in October 2014. It describes the cyclone's formation, rapid intensification to winds of 175 km/h, and landfall near Visakhapatnam. The cyclone caused extensive damage estimated at over $1 billion and at least 109 deaths in India and Nepal. Infrastructure like buildings, bridges, and power lines were destroyed. Crops and fishing boats were also damaged. The document then discusses coping strategies and improvements needed to disaster management plans to better prepare for future cyclones.
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
This document summarizes the results of a geophysical investigation using vertical electrical sounding (VES) methods at 13 locations around an industrial area in India. The VES data was interpreted to generate geo-electric sections and pseudo-sections showing subsurface resistivity variations. Three main layers were typically identified - a high resistivity topsoil, a weathered middle layer, and a basement rock. Pseudo-sections revealed relatively more weathered areas in the northwest and southwest. Resistivity sections helped identify zones of possible high groundwater potential based on low resistivity anomalies sandwiched between more resistive layers. The study concluded the electrical resistivity method was useful for understanding subsurface geology and identifying areas prospective for groundwater exploration.
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
1. The document discusses urban flooding in Bangalore, India. It describes how factors like heavy rainfall, population growth, and improper land use have contributed to increased flooding in the city.
2. Flooding events in 2013 are analyzed in detail. A November rainfall caused runoff six times higher than the drainage capacity, inundating low-lying residential areas.
3. Impacts of urban flooding include disrupted daily life, damaged infrastructure, and decreased economic activity in affected areas. The document calls for improved flood management strategies to better mitigate urban flooding risks in Bangalore.
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
This document discusses enhancing post-disaster recovery through optimal infrastructure capacity building. It presents a model to minimize the cost of meeting demand using auxiliary capacities when disaster damages infrastructure. The model uses genetic algorithms to select optimal capacity combinations. The document reviews how infrastructure provides vital services supporting recovery activities and discusses classifying infrastructure into six types. When disaster reduces infrastructure services, a gap forms between community demands and available support, hindering recovery. The proposed research aims to identify this gap and optimize capacity selection to fill it cost-effectively.
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
This document analyzes the effect of lintels and lintel bands on the seismic performance of reinforced concrete masonry infilled frames through non-linear static pushover analysis. Four frame models are considered: a frame with a full masonry infill wall; a frame with a central opening but no lintel/band; a frame with a lintel above the opening; and a frame with a lintel band above the opening. The results show that the full infill wall model has 27% higher stiffness and 32% higher strength than the model with just an opening. Models with lintels or lintel bands have slightly higher strength and stiffness than the model with just an opening. The document concludes lintels and lintel
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
1) A cyclone with wind speeds of 175-200 kph caused massive damage to the green cover of Gitam University campus in Visakhapatnam, India. Thousands of trees were uprooted or damaged.
2) A study assessed different types of damage to trees from the cyclone, including defoliation, salt spray damage, damage to stems/branches, and uprooting. Certain tree species were more vulnerable than others.
3) The results of the study can help in selecting more wind-resistant tree species for future planting and reducing damage from future storms.
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
1) A visual study was conducted to assess wind damage from Cyclone Hudhud along the 27km Visakha-Bheemli Beach road in Visakhapatnam, India.
2) Residential and commercial buildings suffered extensive roof damage, while glass facades on hotels and restaurants were shattered. Infrastructure like electricity poles and bus shelters were destroyed.
3) Landscape elements faced damage, including collapsed trees that damaged pavements, and debris in parks. The cyclone wiped out over half the city's green cover and caused beach erosion around protected areas.
1) The document reviews factors that influence the shear strength of reinforced concrete deep beams, including compressive strength of concrete, percentage of tension reinforcement, vertical and horizontal web reinforcement, aggregate interlock, shear span-to-depth ratio, loading distribution, side cover, and beam depth.
2) It finds that compressive strength of concrete, tension reinforcement percentage, and web reinforcement all increase shear strength, while shear strength decreases as shear span-to-depth ratio increases.
3) The distribution and amount of vertical and horizontal web reinforcement also affects shear strength, but closely spaced stirrups do not necessarily enhance capacity or performance.
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
1) A team of 17 professional engineers from various disciplines called the "Griha Seva" team volunteered after the 2001 Gujarat earthquake to provide technical assistance.
2) The team conducted site visits, assessments, testing and recommended retrofitting strategies for damaged structures in Bhuj and Ahmedabad. They were able to fully assess and retrofit 20 buildings in Ahmedabad.
3) Factors observed that exacerbated the earthquake's impacts included unplanned construction, non-engineered buildings, improper prior retrofitting, and defective materials and workmanship. The professional engineers' technical expertise was crucial for effective post-disaster management.
This document discusses risk analysis and environmental hazard management. It begins by defining risk, hazard, and toxicity. It then outlines the steps involved in hazard identification, including HAZID, HAZOP, and HAZAN. The document presents a case study of a hypothetical gas collecting station, identifying potential accidents and hazards. It discusses quantitative and qualitative approaches to risk analysis, including calculating a fire and explosion index. The document concludes by discussing hazard management strategies like preventative measures, control measures, fire protection, relief operations, and the importance of training personnel on safety.
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
This document summarizes research on the performance of reinforced concrete shear walls that have been repaired after damage. It begins with an introduction to shear walls and their failure modes. The literature review then discusses the behavior of original shear walls as well as different repair techniques tested by other researchers, including conventional repair with new concrete, jacketing with steel plates or concrete, and use of fiber reinforced polymers. The document focuses on evaluating the strength retention of shear walls after being repaired with various methods.
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
This document summarizes a study on monitoring and assessing air quality with respect to dust particles (PM10 and PM2.5) in the urban environment of Visakhapatnam, India. Sampling was conducted in residential, commercial, and industrial areas from October 2013 to August 2014. The average PM2.5 and PM10 concentrations were within limits in residential areas but moderate to high in commercial and industrial areas. Exceedance factor levels indicated moderate pollution for residential areas and moderate to high pollution for commercial and industrial areas. There is a need for management measures like improved public transport and green spaces to combat particulate air pollution in the study areas.
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
This document describes a low-cost wireless sensor network and smartphone application system for disaster management. The system uses an Arduino-based wireless sensor network comprising nodes with various sensors to monitor the environment. The sensor data is transmitted to a central gateway and then to the cloud for analysis. A smartphone app connected to the cloud can detect disasters from the sensor data and send real-time alerts to users to help with early evacuation. The system aims to provide low-cost localized disaster detection and warnings to improve safety.
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
This document summarizes an analysis of seismic vulnerability along the east coast of India. It discusses the geotectonic setting of the region as a passive continental margin and reports some moderate seismic activity from offshore in recent decades. While seismic stability cannot be assumed given events like the 2004 tsunami, no major earthquakes have been recorded along this coast historically. The document calls for further study of active faults, neotectonics, and implementation of improved seismic building codes to mitigate vulnerability.
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
This document discusses how fracture mechanics can be used to better predict damage and failure of structures. It notes that current design codes are based on small-scale laboratory tests and do not account for size effects, which can lead to more brittle failures in larger structures. The document outlines how fracture mechanics considers factors like size effect, ductility, and minimum reinforcement that influence the strength and failure behavior of structures. It provides examples of how fracture mechanics has been applied to problems like evaluating shear strength in deep beams and investigating a failure of an oil platform structure. The document argues that fracture mechanics provides a more scientific basis for structural design compared to existing empirical code provisions.
This document discusses the assessment of seismic susceptibility of reinforced concrete (RC) buildings. It begins with an introduction to earthquakes and the importance of vulnerability assessment in mitigating earthquake risks and losses. It then describes modeling the nonlinear behavior of RC building elements and performing pushover analysis to evaluate building performance. The document outlines modeling RC frames and developing moment-curvature relationships. It also summarizes the results of pushover analyses on sample 2D and 3D RC frames with and without shear walls. The conclusions emphasize that pushover analysis effectively assesses building properties but has limitations, and that capacity spectrum method provides appropriate results for evaluating building response and retrofitting impact.
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
1) A 6.0 magnitude earthquake occurred off the coast of Paradip, Odisha in the Bay of Bengal on May 21, 2014 at a depth of around 40 km.
2) Analysis of magnetic and bathymetric data from the area revealed the presence of major lineaments in NW-SE and NE-SW directions that may be responsible for seismic activity through stress release.
3) Movements along growth faults at the margins of large Bengal channels, due to large sediment loads, could also contribute to seismic events by triggering movements along the faults.
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
This document discusses the effects of Cyclone Hudhud on the development of Visakhapatnam as a smart and green city through a case study and preliminary surveys. The surveys found that 31% of participants had experienced cyclones, 9% floods, and 59% landslides previously in Visakhapatnam. Awareness of disaster alarming systems increased from 14% before the 2004 tsunami to 85% during Cyclone Hudhud, while awareness of disaster management systems increased from 50% before the tsunami to 94% during Hudhud. The surveys indicate that initiatives after the tsunami improved awareness and preparedness. Developing Visakhapatnam as a smart, green city should consider governance
Discover the latest insights on Data Driven Maintenance with our comprehensive webinar presentation. Learn about traditional maintenance challenges, the right approach to utilizing data, and the benefits of adopting a Data Driven Maintenance strategy. Explore real-world examples, industry best practices, and innovative solutions like FMECA and the D3M model. This presentation, led by expert Jules Oudmans, is essential for asset owners looking to optimize their maintenance processes and leverage digital technologies for improved efficiency and performance. Download now to stay ahead in the evolving maintenance landscape.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
The CBC machine is a common diagnostic tool used by doctors to measure a patient's red blood cell count, white blood cell count and platelet count. The machine uses a small sample of the patient's blood, which is then placed into special tubes and analyzed. The results of the analysis are then displayed on a screen for the doctor to review. The CBC machine is an important tool for diagnosing various conditions, such as anemia, infection and leukemia. It can also help to monitor a patient's response to treatment.
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
Websites using touchless interaction having graphical
1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 142
WEBSITES USING TOUCHLESS INTERACTION HAVING GRAPHICAL PASSWORD AUTHENTICATION AND EMBEDDED ANDROID APPLICATION Wafa Waheeda S1, M. Shunmugapriya2, K. Dheephikaa3, J. Visumathi4 1Department of CSE, Jeppiaar Engineering College, Chennai, India 2Department of CSE, Jeppiaar Engineering College, Chennai, India 3Department of CSE, Jeppiaar Engineering College, Chennai, India 4Department of CSE, Jeppiaar Engineering College, Chennai, India Abstract Living in an era of touch screens and large monitor screens, basic interactions on them have gone uncomfortable and difficult to understand. To overcome this difficulty, we discovered that, operating a device with the help of gestures via touch less interaction. To apply the idea of touch less interaction on a website, web camera facility is required, as the website takes the navigation instructions from a web camera. Henceforth a device which is connected to the internet uses the JavaScript and web camera gestures to enable having a website to navigate through the large monitor screens and also to be easily operated. In this busy world, where users keep forgetting account passwords, this website also allows them to generate graphical passwords for authentication. This will make user accounts sound safer and passwords remember able. In this paper we have developed a website using touch less interaction and also this website has an embedded android application running on it. Keywords: Touch less interaction, Gesture based navigation, Graphical password, Embedded Android application;
----------------------------------------------------------------------***-------------------------------------------------------------------- 1. INTRODUCTION Independent navigation is becoming a bigger challenge with the advances in technology and increasing size of monitor screens. As with growing technology, the digital displays keep on growing in size and they have also found their way into homes, offices and public spaces, more and more. However, in many cases these displays are not yet interactive and they merely present information. An untapped potential is the interactivity of these large displays for which there are diverse application areas: meeting rooms, surgery rooms and shopping centers. And these digital devices will always be connected to the internet. Providing a website, which will be operated based on Gesture based navigation via touch less interaction, will solve the problem faced on large digital screens. Examples include the interactions for navigating e-shopping website or any other website, which can be navigated via touch less interaction on any large sized digital display screens.
For the touch less interface to be successful, it is of paramount importance to understand the interactions that take place with it. It was recently shown that touch-sensitive displays can be built cheaply and with ease and, as a result, there has been extensive attention for the interactions with touch-sensitive displays. However, interactions with large displays cannot always be based only on tactile input. Displays might be placed out of reach or behind glass surfaces to prevent vandalism, other users might obstruct the interaction or the display might be too large.
The digital display surface or monitor screens may not be touched in touch less, gesture-based interactions. These interactions are a direct extension of touch-based interactions and, as a result, they can and should complement one another. But what makes hand gestures are suited for these touch less interactions is that the choice for gestures in commercial systems and scientific prototypes is driven by technological developments and by the cost, complexity and availability of the sensors that are used to look at the users gesturing. This often entails that seemingly unnatural gestures must be learned by users to accommodate the sensor, for example, using the flat hand in various poses to navigate a menu of website. This contradicts other claims that the interaction should come naturally. However, the extent in which these gestures are really intuitive is mostly ignored; „intuitive‟ meaning how easy users can learn, remember and correctly perform these gestures.
Touch less, gesture-based interactions with large displays are best based on intuitive, everyday actions. And providing a graphical password to the touch less website user is becoming of prime importance, because of the busy life. A graphical password system is to provide an authentication system that works by having the user to select from images, in a specific
2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 143
order which are presented in a graphical user interface (GUI). Also the most commonly used computer authentication methods, is to use alphanumerical usernames and passwords. But using alphanumeric usernames and passwords have shown drawbacks in terms of security. For example, the user tends to choose a password that can be easily remember able and guessed. On the other hand, it gets hard for the user to guess a password which is often hard to remember and guess. Authentication is the process to allow users to confirm his or her identity to a Web application. The weakest link in a computer security system, where often considered to be human factors. There are three major areas where human-computer interaction is considered very important. They are, 1. Authentication 2. Developing Secure Systems and 3. Secure Operations. And here we focus on the user authentication problem. We know that a a secret form of authentication to data is via a password. The password is known only to the user or in other words. It is kept secret from the unauthorized to prevent their access. And those users who wish to gain access are tested whether they know the password or not and based on that, they are granted or denied access accordingly. And the use of password in ancient times, would allow the person knowing the password. But now a days, in modern times, the passwords control access to a protected computer operating system, ATMs machines, Bank accounts, Mobile phones etc. Generally, a typical computer user will require passwords for a lot of purposes like, logging in to the computer system‟s account, accessing the private files, email accounts, databases, networks, bank accounts and web sites. As most of the things happen online now a days, everything gets stored in a computer by a user from reading newspaper to accessing their highly confidential bank accounts. Passwords are even now a very good and strong authentication method used up to now. But the huge advance in the uses of computer in many applications, such as sharing of data, data transfer, login to emails or internet are some of the drawbacks of conventional password, which appears like the stolen password or even forgetting the password and week password. And so there is a big necessity for the users to have a strong authentication way which is needed to secure their applications. And thus, to avoid the weakness and drawbacks of conventional password, we go for the graphical password authentication methods. The graphical password authentication system is proposed as a possible alternative to the text based password authentication. And is proposed by the fact that all humans cannot remember text as well as they remember pictures better. Especially photos, a form of pictures representing moments, can be easily remembered than random pictures.
And this website has an embedded android application, which makes it multi-operational. Here, the user is allowed to access the website via touch less interaction and also create graphical password authentication. Having an android application, which enables the user to run the application, makes the website more interactive and productive.
In further sections, we discuss more about the touch less interaction, gesture based navigation, the graphical password authentication and the embedded android application. On whole, the era of touch less technology and touch less websites is being discussed. 2. LITERATURE SURVEY [1] David Lowe, Xiaoying Kong "NavOptim Coding: Supporting Website Navigation Optimisation using Effort Minimisation") put forth the idea of the importance of web applications and also highlighted the problems faced during the web navigation. Also proposed the navigation optimization techniques for it. [2] Wim Fikkert Paul van der Vet Anton Nijholt "User-evaluated Gestures for Touchless Interactions from a Distance" highlighted more on the touchless interactions with a device using a gesture based navigation technique. But the proposed system is where a tocuhless interaction will enable navigation in a website on large displays via gesture based navigation. This website will also have a graphical password authentication facility and an embedded android application features in it. Also, [3] Yuxin Meng "Designing Click-Draw Based Graphical Password Scheme for Better Authentication" and [4] Srinath Akula, Veerabhadram Devisetty‟s “Image Based Registration and Authentication System” elaborated more on the authentication of user via images. [5]Yonghong Wu, Jianchao Luo, Lei Luo "Porting mobile web application engine to the Android platform" explain the graphical passwords and porting android on web platform in a elaborated manner on different systems. But in this proposed system, they will be deployed on a website accesses via touchless interaction using gesture based navigation facility. [6]Don Norman & Bahar Wadia “The Next Touch Evolution. Advancing the Consumer Experience in Other Realms: Tasks and Tough Environments” highlighted the opportunities and challenges for touch and gesture based systems, which are overcome in this proposed system. [7]“Design and development of an Android application to process and display summarized corporate data” explained the concept of databases in android apps, and the data storage, access in them. 3. LINEAMENT OF SYSTEM This system is provided as a solution to the navigation facility offered by it on large monitor screens. Those digital displays, which are huge, are navigated via touch less interaction based on gestures. The devices have a web camera attached to them, with the help of which navigation through the website takes place.
3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 144
3.1. Touch less Interaction by Gesture Based
Navigation
For touch less interaction to take place in a system on a
device, there exists a sensing space for the gestures to be taken
as input for navigating through the website. The sensing space
will detect the gestures which help in navigating through the
website via touch less interaction. The space between the web
camera and the gestures given by the user, on a device, is
sensing space.
Fig -1: Device‟s sensing space–gesture detection in website
navigation
This figure displays the sensing space of a device. Generally,
in most of the devices, the web camera is attached on top. And
the web navigation facility is obtained by waving the hand
(making a gesture) in front of the web camera attached to the
large digital display device.
Fig -2: Website navigation through gesture based touch less
interaction
The website having touch less gesture based navigation is used
to navigate the menu of the website using the web camera. For
the website to use the web camera facility, the java script plug
in will be invoked by it. And the user will be allowed to view
the option dialog box, to enable the java plug in and navigate
the website using the web camera of device. This device will
also enable the user to have a login access. And authenticate
the user using graphical password authentication scheme.
3.2. Graphical Password Authentication
A graphical password scheme is to enable the user remember
passwords easily. The graphical password can be in variety of
forms. It is by clicking on the sequence of graphical images,
and recording the sequence and image as password for user
authentication. Generally authentication is of many forms and
the graphical password authentication comes under the
knowledge based authentication method. And in turn, the
knowledge based authentication has two forms, i.e., text based
passwords and picture based passwords.
The picture-based techniques which come under the graphical
password authentication technique, is divided into two
categories, 1. Recognition-based graphical technique and 2.
Recall-based graphical techniques. Here, using the
recognition-based techniques of picture, the user will be
presented with a set of images. And the user will pass the
authentication by recognizing and identifying the images that
he/she has selected during the registration stage of creating an
account for user authentication. Whereas in using the recall-based
techniques, a user is asked to reproduce something that
he/she has created or selected earlier, during the registration
stage.
Here, in the recognition based technique, the registered
pictures are present and displayed as themes, which a user is
allowed to select one as theme for password.
Fig -3: Selecting theme for graphical password authentication
4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 145
When the authentication process is carried, the user must enter the registered images in a correct sequence, as entered in the registration process of account creation. But there is a drawback of this technique. And that is the number of thumb nail images being limited to a number, which corresponds to the small password space. And here, each thumbnail image will be assigned a numerical value. Also, the sequence of selection will generate a numerical password, by which the user will be authenticated. The result will show the image sequence length which was generally shorter than the textural password length. And in turn to address this problem, the idea of combining two pictures to compose a new alphabetical element. Thereby expanding the image alphabet size and having a long secured graphical password to authenticate the user safely. 3.3. Embedding Android Application Embedded android application in the website is the other last feature of it, which helps user run the application and perform the task. Since there are many drawbacks faced by an android application on having database connectivity, running the app on the website will help provide better MySQL connectivity and also test and run the application to perform the application operation. 4. SYSTEM ARCHITECHTURE
Fig -4: Architecture of proposed touch less website The architecture of proposed touch less website system is as shown above. The entire website consists of three built in modules which are the touch less interaction using gesture based navigation, graphical password authentication to the user and embedded android application in the website. In the gesture based navigation module, the JS of the website will invoke and enable the web camera, by asking the user whether he wants to enable or skip and use the default method. And once the web camera is enabled, the user will be allowed to navigate through the website via gestures displayed in front of the web camera.
Here, the graphical password authentication is used to enable the user to create a authenticated account in the website. Thereby enabling security to the user accounts via graphical password authentication. The graphical passwords are of many types, of which the recognition based technique is implemented in the website.
The embedded android application in the website will enable the user to run the android application and perform the basic functionality of the android app embedded in the website. This happens by embedding the .apk file of the android application inside the webpage of the website. 5. IMPLEMENTATION OF THE PROPOSED SYSTEM Working of Proposed System is split into modules for easy explanation. 5.1. Touch less Interaction Our proposed system will comprise of the touchless website, navigating with the help of gesture based navigation. It comprises of 5 steps, which will enable the user to navigate via gestures given by the user through a web camera. Step 1 A touchless website‟s URL is entered by the user where a digital device having internet and web camera facility is navigated using a touchless website by user, giving gestures for navigation Step 2 JavaScript will be invoked and will ask for users permission to access the web camera Step 3 The web camera gets on, and the user is now allowed to make gestures in front of the web camera Step 4 The gestures given by user in front of web camera is identified and taken as the navigation request by the user to the website with the help of the JavaScript Step 5 The user is allowed to navigate via gesture based navigation facility of the website, hence supporting easy navigation. 5.2. Graphical Password Authentication
Here, our proposed graphical password authentication system, will comprise of 6 steps. Out of which steps 1-3 are registration steps to enable the user register for a graphical password authenticated account. And steps 4-6 are for
5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 146
authentication, which will enable the user to authenticate
safely with the graphical password facility.
Step 1
The first step is for the user to register and to type the
username and a textual password, which will be stored in the
database.
Step 2
In this second step objects in the form of pictures will be
displayed to the user and he/she selects minimum of three
objects or spots on a picture, from the set displayed. The
selected spots on the picture will be again stored in the
database with the specific appropriate username.
Step 3
And during the authentication, user selects the registered
picture, and clicks on the spots as his password on a touch
sensitive screen (or according to the environment) with a
mouse.
Step 4
The system performs pre-processing where a numerical
calculation will be performed by the system, taking in
consideration of the numerical value of the spots on picture
and the sequence
Step 5
In this step, the system compares the numerical value of that in
the database
Step 6
After crosschecking, the system considers the user to be
authenticated and logs in the user successfully
5.3. Embedded Android Application
And finally the last module of our proposed system will
consist of an android application inside the website, suitable
database connectivity. The working of the android application
will comprise of the following steps.
Step 1
The user, after logging in the website, will be directed to the
embedded android application. Where, the apk file of android
app, embedded inside the website, allows the user to operate
the app.
Step 2
User enters values, and interacts with the android application.
Step 3
Entered input values get stored in the database.
Step 4
The application functions and processes the output on the
android application of the web page.
6. PROPOSED SYSTEM OUTPUT
6.1. Touch less Interaction on the Website
The enabled JavaScript will display a message to the user, to
allow the web camera access of the system. And when the web
camera is enabled, the user navigates, by making gestures in
front of the web camera.
Fig -5: Touch less Website displaying JavaScript Message to
User
6.2. Graphical Password Authentication
During registration, the user is allowed to select a graphical
password for account. Registered images displayed as themes,
from which the user is allowed to select one, and create a
password by clicking on each part of the image chosen.
Fig -6: Login Interface
6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 147
Fig -7: Choosing Password
6.3. Embedded Android Application
After logging into an account, user can run application and
perform task. This application creates connectivity to MySQL
database and performs the application.
Fig -8: Embedded Android Application in the Website
7. CONCLUSIONS
In this paper, we have proposed touch less website with three
built in modules enabled in it. With the features of gesture
based navigation in front of a web camera, graphical password
authentication and an android application embedded in the
website, the website proves to be multipurpose. And is also
efficient compared to the drawbacks, which were overcome in
this proposed system.
REFERENCES
[1]. David Lowe, Xiaoying Kong "NavOptim Coding:
Supporting Website Navigation Optimisation using Effort
Minimisation" in 2004 IEEE/WIC/ACM International
Conference on Web Intelligence (WI‟04).
[2]. Wim Fikkert Paul van der Vet Anton Nijholt "User-evaluated
Gestures for Touchless Interactions from a
Distance" in 2010 IEEE International Symposium on
Multimedia 2010 IEEE International Symposium on
Multimedia.
[3]. Yuxin Meng "Designing Click-Draw Based Graphical
Password Scheme for Better Authentication" in 2012 IEEE
Seventh International Conference on Networking,
Architecture, and Storage.
[4]. “Image Based Registration and Authentication System” by
Srinath Akula, Veerabhadram Devisetty from St cloud State
University, St. Cloud, MN 56301
[5]. Yonghong Wu, Jianchao Luo, Lei Luo "Porting mobile
web application engine to the Android platform" in 2010 10th
IEEE International Conference on Computer and Information
Technology.
[6]. Don Norman & Bahar Wadia “The Next Touch Evolution.
Advancing the Consumer Experience in Other Realms: Tasks
and Tough Environments” in 2013 Society for Information
Display conference, Vancouver, Canada (May 23, 2013)
[7]. Fiawoo, S.Y. ; Dept. of Comput. Eng., Univ. of Ghana,
Accra, Ghana ; Sowah, R.A. “Design and development of an
Android application to process and display summarized
corporate data” .
[8]. Wazir Zada Khan, Mohammed Y Aalsalem and Yang
Xiang "A Graphical Password Based System for Small Mobile
Devices ".
BIOGRAPHIES
Wafa Waheeda S is an undergraduate in
Computer Science and Engineering in
Jeppiaar Engineering College, Anna
University. She has special interest in
website and application development. She is
a Richard E Merwin Scholar in 2013. She
has taken over various responsibilities in
IEEE, IEEE WIE, IEEE Computer Society,
and Computer Society of India. She is placed at Wipro pvt ltd
and is starting her career this year. She has good social
concern and involves herself in activities encouraging women
and students with high interest.
M. Shunmugapriya is an undergraduate
student of Computer Science and
Engineering in Jeppiaar Engineering
College, Anna University.
7. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 148
K. Dheephikaa is an undergraduate student of Computer Science and Engineering in Jeppiaar Engineering College, Anna University.