http://WWW.FINALYEARPROJECTS.NET
http://WWW.FINALYEARPROJECTS.NET

Checking delivery availability...

background-sm
Search
3

Updates found with 'human health'

Page  1 1

Updates found with 'human health'

VLSI PROJECTS ABSTRACT 2016-2017 LOW-POWER SYSTEM FOR DETECTION OF SYMPTOMATIC PATTERNS IN AUDIO BIOLOGICAL SIGNALS ABSTRACT:In this paper, we present a low-power, efficacious, and scalable system for the detection of symptomatic patterns in biological audio signals. The digital audio recordings of various symptoms, such as cough, sneeze, and so on, are spectrally analyzed using a discrete wavelet transform. Subsequently, we use simple mathematical metrics, such as energy, quasi-average, and coastline parameter for various wavelet coefficients of interest depending on the type of pattern to be detected. Furthermore, a multi-frequency spectrum-based analysis is applied to distinguish between signals, such as cough and sneeze, which have a similar frequency response and, hence, occur in common wavelet coefficients. Algorithm-circuit codesign methodology is utilized in order to optimize the system at algorithm and circuit levels of design abstraction. This helps in implementing a low-power system as well as maintaining the efficacy of detection. The system is scalable in terms of user specificity as well as the type of signal to be analyzed for an audio symptomatic pattern. We utilize multiplierless implementation circuit strategies and the algorithmic modification of multi spectrum computation to implement low power system in the 65-nm bulk Si technology. It is observed that the pattern detection system achieves about 90% correct classification of five types of audio health symptoms. We also scale the supply voltage due to lower frequency of operation and report a total power consumption of ∼184 µW at 700 mV supply. The proposed architecture of this paper analysis the logic size, area and power consumption using Xilinx 14.2. EXISTING SYSTEM: In the past decade, rapid advancements in the development of low-power design methodologies have resulted in feasible designs for various wearable and implantable medical systems. Numerous wearable health monitoring systems have been proposed in order to deliver early warning of an impending health condition. These systems monitor various internal as well as external parameters related to the human health, such as temperature, heart rate, and so on. Apart from these parameters, it is well known that acoustic symptoms, such as cough, sneeze, belching, and so on, are early markers of serious health issues, such as influenza, diarrhea, and whooping cough, especially among children. If repetitive occurrence of these symptoms is detected in advance, it is possible for the patient or the healthcare personnel to commence remedial action prior to aggravation of the problem. In the literature, most of the developed systems detect a single acoustic symptom (cough or sneeze). The Kids Health Monitoring System (KiMS) proposed in uses wearable sensors and acoustic signal processing in order to provide health monitoring in children. Using the neural network-based processing, the KiMS classifies various symptoms and activities and, subsequently, transmits the record to a parent or doctor for further analysis.PROPOSED SYSTEM: We describe the proposed algorithm and the methodology used to modify the various computational tools in order to make it implementable into low-power hardware. In Section II, we had described the basics and justified the basis for selecting specific computational techniques used in developing this algorithm. The application of these computations is dependent on the characteristic property of the symptom to be detected. The algorithm methodology is shown in Fig. 1. We also describe the details along with the mapping of algorithm to specific signals as follows. ADVANTAGES:• efficient low-power health monitoring system DISADVANTAGES• High power for monitoring system.SOFTWARE IMPLEMENTATION:• Modelsim• Xilinx ISE
Send Enquiry
Read More
IEEE 2016 -2017 Embedded System Projects TitlesS.No Project Title Code1. Coexistence of ZigBee-Based WBAN and Wi-Fi for Health Telemonitoring Systems Wireless2. A Novel Wireless Multifunctional Electronic Current Transformer based on ZigBee-based Communication Wireless3. Configurable ZigBee-based control system for people with multiple disabilities in smart homes Wireless4. ZigBee network system for observing operating activities of work vehicles Wireless5. Interference-Mitigated ZigBee-Based Advanced Metering Infrastructure Wireless6. A Mobile ZigBee Module in a Traffic Control System ` Wireless7. Energy Efficient Outdoor Light Monitoring and Control Architecture Using Embedded System Wireless8. Low-power wearable ECG monitoring system for multiple-patient remote monitoring Wireless9. Energy-Efficient Intelligent Street Lighting System Using Traffic-Adaptive Control Wireless10. Development of a distributed disaster data and human life sign probe system Wireless11. Design and implementation of a home automation system for smart grid applications Wireless12. Milk products monitoring system with arm processor for early detection of microbial activity ARM13. Micro grid demonstration gateway for players communication and load monitoring and management Wireless14. WiFACT -- Wireless Fingerprinting Automated Continuous Training Wireless15. Lightweight Mashup Middleware for Coal Mine Safety Monitoring and Control Automation Wireless16. A smart wearable system for sudden infant death syndrome monitoring General17. Exoskeleton robots for upper-limb rehabilitation Robotics18. Wearable Camera- and Accelerometer-Based Fall Detection on Portable Devices GSM & GPS19. Innovation in Underwater Robots: Biologically Inspired Swimming Snake Robots Robotics20. GPS based autonomous vehicle navigation and control system GSM & GPS21. Real-Time Driving Monitor System: Combined Cloud Database with GPS IoT22. AgriSys: A smart and ubiquitous controlled-environment agriculture system IoT23. Building Smart Cities Applications using IoT andCloud-based Architectures IoT24. An IoT-based system for collision detection on guardrails IoT25. A vision-based teleoperation method for a robotic arm with 4 degrees of freedom Robotics26. Gesture control of drone using a motion controller Robotics27. Development of the Mobile Robot with a Robot Arm Robotics28. Milk products monitoring system with arm processor for early detection of microbial activity ARM29. Controller Area Network Assisted Grid Synchronization of a Microgrid With Renewable Energy Sources and Storage Electrical30. A Real-Time Embedded System for Monitoring of Cargo Vehicles, Using Controller Area Network (CAN) CAN31. Wireless biosensing network for drivers' health monitoring Biomedical32. Android4Auto: A proposal for integration of Android in vehicle infotainment systems Android33. A pulse measurement and data management system based on Arduino platform and Android device Android34. Remote control and instrumentation of Android devices Android35. “AUTOBOOK” The Messaging Machines (Using GSM and Arduino) Arduino36. Tracking and Theft Prevention System for Two Wheeler Using GSM and GPS GSM & GPS37. Bank Locker Security System Using RFID and GSM Technology GSM38. Design of Entrapment Escalation using GSM for Elevators GSM39. Distribution Line Fault Detection & GSM Module Based Fault Signaling System Electrical40. GSM & PIR Based Advanced Antitheft Security System Security 41. LPG Gas Weight and Leakage Detection System Using GSM GSM42. Android Based Women Tracking System Using GPS and GSM GSM & GPS43. Trespass Prevention System Using IOT IoT44. Automatic Vehicle Accident Detection and Rescue System GSM & GPS45. Design and Implementation of Integrated Mobile Operated Remote Vehicle IoT46. A Wearable Device for Continuous Detection and Screening of Epilepsy during Daily Life IoT47. Review of Automatic Detection and control of Disease for Grape Field Gen48. Environmental Condition Monitoring System for the Industries Gen49. Security Management Access Control System Gen50. Design and Development of Embedded based System for Monitoring Industrial and Environmental Parameters for Analyzing the Health of Human beings Gen51. Visual Surveillance Using Absolute Difference Motion Detection System Raspberry pi52. Automatic Irrigation System Using Internet of Things IoT53. Design of Embedded Irrigation System by Using WSN Wireless54. Vehicle Accident Prevention Using Assistant Braking System Gen55. Smart Transport Database Management System Gen56. Accident Alert Using ZIGBEE and GPS Wireless57. Controlling the Home Appliances Remotely Through Web Application Using ZIGBEE Wireless58. An optimized solar traffic control and alert system using wireless sensor networks Wireless59. Biometric Recognition Technique for ATM System Security60. Light Weight Access Control System for Constrained IOT Devices IoT61. Design of Prototype Model for Home Automation Using Wireless Sensor Networks Wireless62. Automated Sensor Network For Monitoring and Detection of Impurity In Drinking Water System General63. Automated Smart Trolley with Smart Billing Using Arduino Gene64. Embedded Automatic Vehicle Control System Using Voice Recognition On ARM 7 Processor ARM65. Embedded Voice Controlled Computer For Visually Impaired and Physically Disabled People Using Arm Processor ARM66. Implementation of Embedded Web Server Using TCP/IP Protocol with Raspberry PI Raspberry PI67. Designing of Cleaning Robot Robot68. An Analysis of Network-Based Control System Using Controller Area Network (CAN) Protocol CAN69. Identify the Deterioration in Pipe by Using Wheel Operated Robot Robot70. RFID -G Based Navigation System For Visually Impaired To Work at Industry Gen71. New Generation ATM Terminal Services NFC72. A Wireless Sensor Interface for the Quantification of Tremor Using Off the Shelf Components Wireless73. Design and Implementation of Low-Cost SMS Based Monitoring System of Distribution Transformers GSM74. An Integrated Cloud-Based Smart Home Management System with Community Hierarchy Automation75. Home Outlet and LED Array Lamp Controlled by a Smartphone with a Hand Gesture Recognition Gesture76. Low-power wearable ECG monitoring system for multiple-patient remote monitoring Bio-medical77. Smart Real-Time Healthcare Monitoring and Tracking System using GSM/GPS Technologies Bio-medical78. The Design of Building Fire Monitoring System Based on ZigBee-WiFi Networks Wireless
Send Enquiry
Read More
JAVA/DOT NET PROJECTS ABSTRACT 2016-2017 PROVIDING USER SECURITY GUARANTEES IN PUBLIC INFRASTRUCTURE CLOUDS ABSTRACT: The infrastructure cloud (IaaS) service model offers improved resource flexibility and availability, where tenants – insulated from the minutiae of hardware maintenance – rent computing resources to deploy and operate complex systems. Large-scale services running on IaaS platforms demonstrate the viability of this model; nevertheless, many organizations operating on sensitive data avoid migrating operations to IaaS platforms due to security concerns. In this paper, we describe a framework for data and operation security in IaaS, consisting of protocols for a trusted launch of virtual machines and domain-based storage protection. We continue with an extensive theoretical analysis with proofs about protocol resistance against attacks in the defined threat model. The protocols allow trust to be established by remotely attesting host platform configuration prior to launching guest virtual machines and ensure confidentiality of data in remote storage, with encryption keys maintained outside of the IaaS domain. Presented experimental results demonstrate the validity and efficiency of the proposed protocols. The framework prototype was implemented on a test bed operating a public electronic health record system, showing that the proposed protocols can be integrated into existing cloud environments.SYSTEM ANALYSISEXISTING SYSTEM The protocols allow trust to be established by remotely attesting host platform configuration prior to launching guest virtual machines and ensure confidentiality of data in remote storage, with encryption keys maintained outside of the IaaS domain. Presented experimental results demonstrate the validity and efficiency of the proposed protocols. The framework prototype was implemented on a test bed operating a public electronic health record system, showing that the proposed protocols can be integrated into existing cloud environments.PROPOSED SYSTEM: Presented an IaaS storage protection scheme addressing access control. The authors analyse access rights management of shared versioned encrypted data on cloud infrastructure for a restricted group and propose a scalable and flexible key management scheme. Access rights are represented as a graph, making a distinction between data encryption keys and encrypted updates on the keys and enabling flexible join/leave client operations, similar to properties presented by the protocols in this paper. Despite its advantages, the requirement for client-side encryption limits the applicability of the scheme in and introduces important functional limitations on indexing and search. In our model, all cryptographic operations are performed on trusted IaaS compute hosts, which are able to allocate more computational resources than client devices.Abundant works have been proposed under different threat models to achieve various search functionality, SYSTEM SPECIFICATIONHardware Requirements:• System : Pentium IV 2.4 GHz.• Hard Disk : 40 GB.• Floppy Drive : 1.44 Mb.• Monitor : 14’ Colour Monitor.• Mouse : Optical Mouse.• Ram : 512 Mb.Software Requirements:• Operating system : Windows 7 Ultimate.• Coding Language : ASP.Net with C#• Front-End : Visual Studio 2012 Professional.• Data Base : SQL Server 2008.CONCLUSION: From a tenant point of view, the cloud security model does not yet hold against threat models developed for the traditional model where the hosts are operated and used by the same organization. However, there is a steady progress towards strengthening the IaaS security model. In this work we presented a framework for trusted infrastructure cloud deployment, with two focus points: VM deployment on trusted compute hosts and domain-based protection of stored data. We described in detail the design, implementation and security evaluation of protocols for trusted VM launch and domain-based storage protection. The solutions are based on requirements elicited by a public healthcare authority, have been implemented in a popular open-source IaaS platform and tested on a prototype deployment of a distributed EHR system. In the security analysis, we introduced a series of attacks and proved that the protocols hold in the specified threat model. To obtain further confidence in the semantic security properties of the protocols, we have modelled and verified them with ProVerif. Finally, our performance tests have shown that the protocols introduce a insignificant performance overhead. This work has covered only a fraction of the IaaS attack landscape. Important topics for future work are strengthening the trust model in cloud network communications, data geolocation, and applying searchable encryption schemes to create secure cloud storage mechanisms.
Send Enquiry
Read More
VLSI PROJECTS ABSTRACT 2016 -2017LOW-POWER SYSTEMS FOR DETECTION OF SYMPTOMATIC PATTERNS IN AUDIO BIOLOGICAL SIGNALSABSTRACT: In this paper, we present a low-power, efficacious, and scalable system for the detection of symptomatic patterns in biological audio signals. The digital audio recordings of various symptoms, such as cough, sneeze, and so on, are spectrally analyzed using a discrete wavelet transform. Subsequently, we use simple mathematical metrics, such as energy, quasi-average, and coastline parameter for various wavelet coefficients of interest depending on the type of pattern to be detected. Furthermore, a mel-frequency cepstrum-based analysis is applied to distinguish between signals, such as cough and sneeze, which have a similar frequency response and, hence, occur in common wavelet coefficients. Algorithm-circuit codesign methodology is utilized in order to optimize the system at algorithm and circuit levels of design abstraction. This helps in implementing a low-power system as well as maintaining the efficacy of detection. The system is scalable in terms of user specificity as well as the type of signal to be analyzed for an audio symptomatic pattern. We utilize multiplierless implementation circuit strategies and the algorithmic modification of mel cepstrum computation to implement low power system in the 65-nm bulk Si technology. It is observed that the pattern detection system achieves about 90% correct classification of five types of audio health symptoms. We also scale the supply voltage due to lower frequency of operation and report a total power consumption of ~184 µW at 700 mV supply.
Send Enquiry
Read More
JAVA PROJECTS ABSTRACT 2016-2017 A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM ABSTRACT:Abstract :Authentication based on passwords is used largely in applications for computer security and privacy. However, human actions such as choosing bad passwords and inputting passwords in an insecure way are regarded as ”the weakest link” in the authentication chain. Rather than arbitrary alphanumeric strings, users tend to choose passwords either short or meaningful for easy memorization. With web applications and mobile apps piling up, people can access these applications anytime and anywhere with various devices. This evolution brings great convenience but also increases the probability of exposing passwords to shoulder surfing attacks. Attackers can observe directly or use external recording devices to collect users’ credentials. To overcome this problem, we proposed a novel authentication system PassMatrix, based on graphical passwords to resist shoulder surfing attacks. With a one-time valid login indicator and circulative horizontal and vertical bars covering the entire scope of pass-images, PassMatrix offers no hint for attackers to figure out or narrow down the password even they conduct multiple camera-based attacks. We also implemented a PassMatrix prototype on Android and carried out real user experiments to evaluate its memorability and usability. From the experimental result, the proposed system achieves better resistance to shoulder surfing attacks while maintaining usability. Existing Systems: In order to be more secure than the existing Android pattern password with entropy 18:57 bits against brute force attacks, users have to set two pass-images and use the graphical method to obtain the one-time login indicators. Like most of other graphical password authentication systems, PassMatrix is vulnerable to random guess attacks based on hot-spot analyzing. TEXTUAL passwords have been the most widely used authentication method for decades. Comprised of numbers and upper- and lower-case letters, textual passwords are considered strong enough to resist against brute force attacks. According to an article in Computer world, a security team at a large company ran a network password cracker and surprisingly cracked approximately 80% of the employees’ passwords within 30 seconds [3]. Textual passwords are often insecure due to the difficulty of maintaining strong ones.Proposed Systems: This evolution brings great convenience but also increases the probability of exposing passwords to shoulder surfing attacks. Attackers can observe directly or use external recording devices to collect users’ credentials. To overcome this problem, we proposed a novel authentication system PassMatrix, based on graphical passwords to resist shoulder surfing attacks. With a one-time valid login indicator and circulative horizontal and vertical bars covering the entire scope of pass-images, PassMatrix offers no hint for attackers to figure out or narrow down the password even they conduct multiple camera-based attacks. a lot of research on password authentication has been done in the literature. Among all of these proposed schemes, this paper focuses mainly on the graphical-based authentication systems. To keep this paper concise, we will give a brief review of the most related schemes that were mentioned in the previous section. The accuracy perspective focuses on the successful login rates in both sessions, including the practice logins. The usability perspective is measured by the amount of time users spent in each PassMatrix phase.Advantage:Two techniques are proposed to generate session passwords using text and colors which are resistant to shoulder surfing. The habitual movements and the preference of users that the attacker may take advantage of to figure out the potential passwords. 1) Any communication between the client device and the server is protected by SSL so that packets or information will not be eavesdropped or intercepted by attackers during transmission. 2) The server and the client devices in our authentication system are trustworthy. 3) The keyboard and the entire screen of mobile devices are difficult to protect, but a small area (around 1:5 cm2) is easy to be protected from malicious people who might shoulder surf passwords. 4) Users are able to register an account in a place that is safe from observers with bad intention or surveillance cameras that are not under proper management.SOFTWARE REQUIREMENTS: Operating System : Windows Technology : Java and J2EE Web Technologies : Html, JavaScript, CSS IDE : My Eclipse Web Server : Tomcat Network : LAN Database : My SQL Java Version : J2SDK1.5 HARDWARE REQUIREMENTS: Hardware : Pentium Speed : 1.1 GHz RAM : 1GB Hard Disk : 20 GB Floppy Drive : 1.44 MB Key Board : Standard Windows Keyboard Mouse : Two or Three Button Mouse Monitor : SVGAConclusion:With the increasing trend of web services and apps, users are able to access these applications anytime and anywhere with various devices. In order to protect users’ digital property, authentication is required every time they try to access their personal account and data. However, conducting theauthentication process in public might result in potential shoulder surfing attacks. Even a complicated password can be cracked easily through shoulder surfing. Using traditional textual passwords or PIN method, users need totype their passwords to authenticate themselves and thus these passwords can be revealed easily if someone peeks over shoulder or uses video recording devices such as cell phones.
Send Enquiry
Read More
JAVA PROJECTS ABSTRACT 2016-2017PASSBYOP: BRING YOUR OWN PICTURE FOR SECURING GRAPHICAL PASSWORDSABSTRACT: PassBYOP is a new graphical password scheme for public terminals that replaces the static digital images typically used in graphical password systems with personalized physical tokens, herein in the form of digital pictures displayed on a physical user-owned device such as a mobile phone. Users present these images to a system camera and then enter their password as a sequence of selections on live video of the token. Highly distinctive optical features are extracted from these selections and used as the password. We present three feasibility studies of PassBYOP examining its reliability, usability, and security against observation. The reliability study shows that image-feature based passwords are viable and suggests appropriate system thresholds—password items should contain a minimum of seven features, 40% of which must geometrically match originals stored on an authentication server in order to be judged equivalent. The usability study measures taskcompletion times and error rates, revealing these to be 7.5 s and 9%, broadly comparable with prior graphical password systems that use static digital images. Finally, the security study highlights PassBYOP’s resistance to observation attack—three attackers are unable to compromise a password using shoulder surfing, camera based observation, or malware. These results indicate that Pass- BYOP shows promise for security while maintaining the usability of current graphical password schemes.Existing System:TEXTUAL passwords have been the most widely used authentication method for decades. Comprised of number sand upper- and lower-case letters, textual passwords are considered strong enough to resist against brute force attacks. However, a strong textual password is hard to memorize and recollect. Therefore, users tend to choose passwords that are either short or from the dictionary, rather than random alphanumeric strings.. Proposed System: Various graphical password authentication schemes were developed to address the problems and weaknesses associated with textual passwords. Based on some studies such as those in , humans have a better ability to memorize images with long-term memory(LTM) than verbal representations. Image-based passwords were proved to be easier to recollect in several user studies As a result, users can set up a complex authentication password and are capable of recollecting it after a long time even if the memory is not activated periodically. ConclusionWith the increasing trend of web services and apps, users are able to access these applications anytime and anywhere with various devices. In order to protect users’ digital property, authentication is required every time they try to access their personal account and data. However, conducting theauthentication process in public might result in potential shoulder surfing attacks. Even a complicated password can be cracked easily through shoulder surfing. Using traditional textual passwords or PIN method, users need totype their passwords to authenticate themselves and thus these passwords can be revealed easily if someone peeks over shoulder or uses video recording devices such as cell phones.
Send Enquiry
Read More
JAVA/DOT NET PROJECTS ABSTRACT 2016-2017 LOCATION PROOF ABSTRACT: Location-based services are quickly becoming immensely popular. In addition to services based on users' current location, many potential services rely on users' location history, or their spatial-temporal provenance. Malicious users may lie about their spatial-temporal provenance without a carefully designed security system for users to prove their past locations. In this paper, we present the Spatial- Temporal provenance Assurance with Mutual Proofs (STAMP) scheme. STAMP is designed for ad - hoc mobile users generating location proofs for each other in a distributed setting. However, it can easily accommodate trusted mobile users and wireless access points. STAMP ensures the integrity and non-transferability of the location proofs and protects users' privacy. Our prototype implementation on the android plat-form shows that STAMP is low-cost in terms of computational and storage resources. Extensive simulation experiments show that our entropy-based trust model is able to achieve high collusion detection accuracy.EXISTING SYSTEM: In the existing system there is a lot of volunteers are needed and also consuming lot of time. Location privacy is an extremely important factor that needs to be taken into consideration when designing any location based systems. Revealing both identity and location information to an untreated party poses threats to a mobile users. Today's location-based services solely rely on users' devices to determine their location, e.g., using GPS. However, it allows malicious users to fake their STP information. Therefore, we need to involve third parties in the creation of STP proofs in order to achieve the integrity of the STP proofs. This, however, opens a number of security and privacy issues. First, involving multiple parties in the generation of STP proofs may jeopardize users' location privacy. Location information is highly sensitive personal data. Knowing where a person was at a particular time, one can infer his/her personal activities, political views, health status, and launch unsolicited advertising, physical attacks or harassment. Authenticity of STP proofs should be one of the main design goals in order to achieve integrity and non-transferability of STP proofs. Moreover, it is possible that multiple parties collude and create fake STP proofs. PROPOSED SYSTEM:In this paper, we propose an STP proof scheme named Spatial-Temporal provenance Assurance with Mutual Proofs (STAMP). STAMP aims at ensuring the integrity and non-transferability of the STP proofs, with the capability of protecting users' privacy. Most of the existing STP proof schemes rely on wireless infrastructure to create proofs for mobile users. However, it may not be feasible for all types of applications.ADVANTAGE:• A distributed STP proof generation (STAMP) is introduced to achieve integrity and non-transferability of STP proofs. • STAMP is designed to maximize users' anonymity and location privacy. Users are given the control over the location granularity of their STP proofs. • STAMP is collusion-resistant. The system is integrated into STAMP to prevent a user from collecting proofs on behalf of another user. An entropy-based trust model is proposed to detect users mutually generating fake proofs for each other.SYSTEM SPECIFICATION:HARDWARE REQUIREMENTS: System : Pentium IV 2.4 GHz. Hard Disk : 40 GB. Floppy Drive : 1.44 Mb. Monitor : 14’ Colour Monitor. Mouse : Optical Mouse. Ram : 512 Mb.SOFTWARE REQUIREMENTS: Operating system : Windows 7 Ultimate. Coding Language : Java. Front-End : Eclipse. Data Base : SQLite Manger.CONCLUSION:STAMP ensures the integrity and non-transferability of the location proofs and protects users' privacy. Most of the existing STP proof schemes rely on wireless infrastructure to create proofs for mobile users. However, it may not be feasible for all types of applications. A security analysis is presented to prove STAMP achieves the security and privacy objectives. A prototype application is implemented on the Android platform. Experiments show that STAMP requires preferably low computational time and storage. Reduce time for searching the route between the locations. Gives accurate details about the current location. User friendly. Reduces paper works. Easy communication between user and the admin. Thus STAMP called the location proof is explained
Send Enquiry
Read More
JAVA/ DOT NET PROJECT ABSTRACT 2016-2017 SBVLC: SECURE BARCODE-BASED VISIBLE LIGHT COMMUNICATION FOR SMART PHONES ABSTRACT:ABSTRACT: As an alternative to NFC technology, 2D barcodes have been increasingly used for security-sensitive applications including payments and personal identification. However, the security of barcode-based communication in mobile applications has not been systematically studied. In this paper, we propose SBVLC - a secure system for barcode-based visible light communication (VLC) between smart phones. We formally analyze the security of SBVLC based on geometric models and propose physical security enhancement mechanisms for barcode communication by manipulating screen view angles and leveraging user-induced motions. We then develop two secure data exchange schemes. These schemes are useful in many security-sensitive mobile applications including private information sharing, secure device pairing, and mobile payment. SBVLC is evaluated through extensive experiments on both Android and I OS smart phones.EXISTING SYSTEM: Short-range communication technologies including near field communication (NFC) and 2D barcodes have enabled many popular smart phone applications such as contactless payments, mobile advertisements, and device pairing. Evolved from the RFID technology, NFC can enable reliable low-power communication between RF tags and readers. However, NFC requires additional hardware and has been supported by only a few smart phone platforms on the market. Recent studies have shown that NFC is subject to security vulnerabilities such as eavesdropping and jamming. Moreover, most existing barcode applications are based on a single barcode exchange, which is insufficient for establishing a secure communication channel. Whenever a user types in her password in a bank’s sign in box, the key logger intercepts the password. The threat of such key loggers is pervasive and can be present both in personal computers and public kiosks; there are always cases where it is necessary to perform financial transactions using a public computer although the biggest concern is that a user’s password is likely to be stolen in these computers. Even worse, key loggers, often root kitted, are hard to detect since they will not show up in the task manager process list.PROPOSED SYSTEM: Compared with NFC, 2D barcodes have enjoyed a significantly higher penetration rate in mobile applications. This is largely due to the extremely low barrier to adoption – almost every camera-enabled smart phone can read and process 2D barcodes. As an alternative to NFC, 2D barcodes have been increasingly used for security-sensitive applications including mobile payments and personal identification. For instance, PayPal recently rolled out a barcode-based payment service for retail customers. As one of the most anticipated new features of I Phone 5, the Passbook App stores tickets, coupons, and gift/loyalty cards using barcodes. Proposes an iterative Increment Constrained Least Squares filter method for certain 2D matrix bar codes within a Gaussian blurring ersatz. In particular, they use the L-shaped finder pattern of their codes to estimate the standard deviation of the Gaussian PSF, and then restore the image by successively implementing a bi-level constraint, our approach to solving the problem is to introduce an intermediate device that bridges a human user and a terminal. Then, instead of the user directly invoking the regular authentication protocol, she invokes a more sophisticated but user-friendly protocol via the intermediate helping device. Every interaction between the user and an intermediate helping device is visualized using a Quick Response (QR) code. The goal is to keep user-experience the same as in legacy authentication methods as much as possible, while preventing key logging attacks.ADVANTAGE:• Compared with NFC, 2D barcodes have enjoyed a significantly higher penetration rate in mobile applications.• As an alternative to NFC, 2D barcodes have been increasingly used for security-sensitive applications including mobile payments and personal identification.• Every interaction between the user and an intermediate helping device is visualized using a Quick Response (QR) code.• Preventing key logging attacks.HARDWARE REQUIREMENTS: System : Pentium IV 2.4 GHz. Hard Disk : 40 GB. Floppy Drive : 1.44 Mb. Monitor : 14’ Colour Monitor. Mouse : Optical Mouse. Ram : 512 Mb.SOFTWARE REQUIREMENTS: Operating system : Windows 7 Ultimate. Coding Language : Java. Front-End : Eclipse. Data Base : SQLite Manger.CONCLUSION: As an alternative to NFC, 2D barcodes have been increasingly used for security-sensitive applications including mobile payments and personal identification. Compared with NFC, 2D barcodes have enjoyed a significantly higher penetration rate in mobile applications. As an alternative to NFC, 2D barcodes have been increasingly used for security-sensitive applications including mobile payments and personal identification. Every interaction between the user and an intermediate helping device is visualized using a Quick Response (QR) code. Preventing key logging attacks. Thus in our project password hacking, key logging and eavesdropping issues will be overcome.
Send Enquiry
Read More
JAVA/ DOT NET PROJECT ABSTRACT 2016-2017 SEARCHABLE ATTRIBUTE-BASED MECHANISM WITH EFFICIENT DATA SHARING FOR SECURE CLOUD STORAGE ABSTRACT: To date, the growth of electronic personal data leads to a trend that data owners prefer to remotely outsource their data to clouds for the enjoyment of the high-quality retrieval and storage service without worrying the burden of local data management and maintenance. However, secure share and search for the outsourced data is a formidable task, which may easily incur the leakage of sensitive personal information. Efficient data sharing and searching with security is of critical importance. This paper, for the first time, proposes a searchable attribute-based proxy re-encryption system. When compared to existing systems only supporting either searchable attribute-based functionality or attribute-based proxy re-encryption, our new primitive supports both abilities and provides flexible keyword update service. Specifically, the system enables a data owner to efficiently share his data to a specified group of users matching a sharing policy and meanwhile, the data will maintain its searchable property but also the corresponding search keyword(s) can be updated after the data sharing. The new mechanism is applicable to many real-world applications, such as electronic health record systems. It is also proved chosen cipher text secure in the random oracle model. Keywords: Searchable attribute-based encryption, keyword update, encrypted data sharing.SYSTEM ANALYSISEXISTING SYSTEM When compared to existing systems only supporting either searchable attribute-based functionality or attribute-based proxy re-encryption, our new primitive supports both abilities and provides flexible keyword update service. Specifically, the system enables a data owner to efficiently share his data to a specified group of users matching a sharing policy and meanwhile, the data will maintain its searchable property but also the corresponding search keyword(s) can be updated after the data sharing. The new mechanism is applicable to many real-world applications, PROPOSED SYSTEM: Attribute-Based Proxy Re-Encryption (ABPRE). To efficiently share an encrypted data with others, Mambo and Okamoto introduced PRE whereby a semi-trusted proxy can transform an encryption of a message to another encryption of the same message without knowing the message. To employ the notion into ABE setting, Liang et al. proposed the notion of ABPRE. Recently, Liang et al. introduced new types of ABPRE with stronger security. Nonetheless, these systems cannot achieve our goals as they do not provide privacy-preserving keyword search.SYSTEM SPECIFICATIONHardware Requirements:• System : Pentium IV 2.4 GHz.• Hard Disk : 40 GB.• Floppy Drive : 1.44 Mb.• Monitor : 14’ Colour Monitor.• Mouse : Optical Mouse.• Ram : 512 Mb.Software Requirements:• Operating system : Windows 7 Ultimate.• Coding Language : ASP.Net with C#• Front-End : Visual Studio 2010 Professional.• Data Base : SQL Server 2008.Conclusion: We defined a new notion searchable attribute-based proxy re-encryption with keyword update, and proposed a concrete construction satisfying the notion. We also proved the new scheme CCA secure in the ROM. The scheme is the first of its type to integrate searchable attribute-based encryption with attribute-based proxy re-encryption, which is applicable to many real-world applications. Although the new system enjoys its valuable advantages, it motivates some interesting open problems, how to reduce the size of search token, how to allow a secret key holder to generate search token individually, and how to provide more expressive keyword search.
Send Enquiry
Read More
VLSI PROJECTS ABSTRACT 2016-2017 INPUT-BASED DYNAMIC RECONFIGURATION OF APPROXIMATE ARITHMETIC UNITS FOR VIDEO ENCODING ABSTRACT: The field of approximate computing has received significant attention from the research community in the past few years, especially in the context of various signal processing applications. Image and video compression algorithms, such as JPEG, MPEG, and so on, are particularly attractive candidates for approximate computing, since they are tolerant of computing imprecision due to human imperceptibility, which can be exploited to realize highly power-efficient implementations of these algorithms. However, existing approximate architectures typically fix the level of hardware approximation statically and are not adaptive to input data. For example, if a fixed approximate hardware configuration is used for an MPEG encoder (i.e., a fixed level of approximation), the output quality varies greatly for different input videos. This paper addresses this issue by proposing a reconfigurable approximate architecture for MPEG encoders that optimizes power consumption with the goal of maintaining a particular Peak Signal-to-Noise Ratio (PSNR) threshold for any video. We propose two heuristics for automatically tuning the approximation degree of the RABs in these two modules during runtime based on the characteristics of each individual video. The proposed architecture of this paper analysis the logic size, area and power consumption using Xilinx 14.2. EXISTING SYSTEM: MPEG has for long been the most preferred video compression scheme in modern video applications and devices. Using the MPEG-2/MPEG-4 standards, videos can be squeezed to very small sizes. MPEG uses both interframe and intraframe encoding for video compression. Intraframe encoding involves encoding the entire frame of data, while interframe encoding utilizes predictive and interpolative coding techniques as means of achieving compression. The interframe version exploits the high temporal redundancy between adjacent frames and only encodes the differences in information between the frames, thus resulting in greater compression ratios. In addition, motion compensated interpolative coding scales down the data further through the use of bidirectional prediction. In this case, the encoding takes place based upon the differences between the current frame and the previous and next frames in the video sequence. PROPOSED SYSTEM: Dynamic variation of the DA can be done when each of the adder/subtractor blocks is equipped with one or more of its approximate copies and it is able to switch between them as per requirement. This reconfigurable architecture can include any approximate version of the adders/subtractors. ADVANTAGES:• Optimize the power consumption DISADVANTAGES:• Power consumption is high SOFTWARE IMPLEMENTATION:• Modelsim• Xilinx ISE
Send Enquiry
Read More
Page 1 1