SlideShare une entreprise Scribd logo
1  sur  7
Télécharger pour lire hors ligne
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1935
AUTHENTICATION SYSTEM IN SOCIAL NETWORKS
A.R Preethi1, M.Gayathri2, P.Jayasri3, J.Jenny Sarah4
1Assistant Professor, Dept. of Information Technology, Jeppiaar SRR Engineering College, Tamil Nadu
2,3,4UG Student, Dept. of Information Technology, Jeppiaar SRR Engineering College, Tamil Nadu
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - Secure Authentication is very important in today’s digital world, Mobile devices use sophisticated applications that
makes life easier and more relax and convenient for users. Such applications, may involve mobile ticketing, identification, access
control operations, etc., are often accessible through social network aggregators. Mobiles are the database for any person’s
personal information. Therefore it turns as an attractive target for the spyware injections. Such malware software’s can steal the
user’s credentials and valuable information’s from their accounts, perform unauthorized mobile access to social networkservices
without the user’s consent. The main aim of this project is to propose the smart way authentication by using a unique logic on
authentication and by using screen brightness of android mobiles in order to avoid various types of attacks. We compare
BrightPass with existing schemes, in order to show its usability and security within the social network arena. Furthermore, we
empirically assess the security of BrightPass through experimentation. Our tests indicate that BrightPass protects the PIN code
against automatic submissions carried out by malware while granting fast authentication phases and reduced error rates.
Key Words: Authentication, Mobiles, Social networks, Malware attacks, Brightpass scheme
1. INTRODUCTION
Social networks are one of the most important communication platforms of the last 15 years with high socio-economic value.
Social networks are an inherent part of today’s internet and used by more than a billion people worldwide. Over the last few
years mobile communication devices have becoming powerful andtodaymany ofthemsupportapplicationbeing installedand
executed on the device. Mobile devices use sophisticated applications that make life easier and more relax and convenient for
users. Because of this people expect these social networking servicestobeavailableon theirmobiledevices.Itallowsexchange
of user-generated content like data, pictures, and videos. Unfortunately, as the importance of these platform rises,theinterest
of the hackers on them increases well, so that theft of user informationandauthenticationbreaches, become problemsinsocial
networking area. Many attacks are successful in accessing social networks accounts and the authentication mechanism is not
efficient and vulnerable to automated attacks. Many of the top most social networking services providers such as google,
facebook, yahoo, twitter, snapchat and dropbox already allow you to optionally require second authentication.Unfortunately,
the mobile devices used for gaining access are often vulnerable to several kind of malware. Mobile malware is a malicious
software that is specifically built to attack mobile phone or smartphone system. This is kind of malware can be abletoretrieve
all type of user information such as passwords and PIN codes which are used for perform authentication in social networking
applications.Hence,the presence of malwareinmobiledevicesreducesimpactonsocial networks.Toovercome malwareattack
numerous authentication methods are discovered. But those processes are takes long authentication time, having high error
rates so they are low acceptance among the users.
In this paper we discuss about BrightPass which enhancing the security and protection it is the simplest effective technique
consist of two screen captures when brightness is high have to enter correct pin digit and when brightnessislowhavetoenter
the fake one. Compare with existing techniquesBrightPassincreasesuserconfidenceandcreategreatimpactonsocial network
access. It provides high security for mobile and sensitive applications against different types of malware attack.
2. RELATED WORK
Nowadays smart phones are built using mobile operating system that allows them to run application with rich and modern
functionality. This type of smart phone are designed with newcommunicationinterfacetocarryoutsecuritycritical operations
which can access personal data in application using alpha numeric password.Thissystemleadstospreadacrossonlinemarket
places and fool the user. This approach helps in preventing the spyware stealing the user credential.
Yi.et.al. proposed a Pass Window which uses PIN digits and pre -selected image called pass icon.
Chow et al. introduce idea of showing special CAPTHCA into a clickable CAPTHCA. These frameworks do not depend on
console input the client is requested to choose few component in the network that match the test case.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1936
Fig-1:ReCAPTCHA
Fig -2: Clickable CAPTCHA
Fig -3: Drawing CAPTCHA
Fig -4: AccCAPTCHA
Kim et al. proposed a Password authentication scheme based ondummy-keycalledFakePIN whichconsistsofalpha numeric
text and password as a secret value.
Asirra that displays 12 images of butterflies and asks users to select all cat images among them.
Shirali-Shahreza et al. proposed CAPTCHA mechanism for mobile phones called drawing CAPTCHA. In this method dot are
displayed on the screen.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1937
Liao et al. proposed a new CAPTCHA scheme based on game logic and human recognition. Here the user as to play a rolling
ball game to pass the CAPTCHA challenges.
3. THE BRIGHTPASS CONCEPT
This approach contains a right PIN Number in a 6 digit format which is stored in a larger way. The request of PIN digitposition
created by SE and further imparted to the client exchanging circle’s splendour esteems is high client must enter the right PIN
digit whether it looks dim client must enter the deceptive lie PIN digit. This method is used by user and security elements to
know the real pin digit with its positions.
3.1 REGISTRATION AND LOGIN
The user creates an account and registers their password to provide user’s information such as phone number, e-maid id and
location. If someone tries to access your account the server generates four digits PIN number for authenticating user account.
The registered mobile no and e-mail id will get alert about your account in some cases
3.2 USER VALIDATION
It is a new PIN-entry method. The basic layout of this method comprises a vertical array of digits from 0 to 9, juxtaposed with
another array of ten familiar symbols such as + and / etc. These symbols are moveable in the vertical order usingup anddown
buttons. At first, decide the symbol for the first digit of the PIN. After the first round when the symbol is decided, then in the
consecutive rounds enter the second, third & fourth digit of the PIN.
3.3 IMPLEMENTING SCREEN BRIGHTNESS FOR AUTHENTICATION
Spyware attack will be avoided by proposing the idea that uses the screen brightness as an authentication tool. For
authentication the server generates the 6 digit binary value. Based on thebinarydigit thebrightnessofthescreengetschanged
to high or low. If the screen brightness is high the user should input the correct PIN digit. Else the user should
give the wrong or random PIN number. This proposed work will remove the digits which inserted while the screen brightness
is low and takes the digit which is inserted when the screen brightness is high authentication. The server get the signature of
user generated PIN and generate the signature value for the Original PIN and compares both the signatures. If the Signatures
are equal the user can access their Profile. If not user access their profile.
3.4 SHARING INFORMATION
Social network is an online platform which helps the people to share personal orcareer information.Thesesocial networksare
distributed across many platforms
Fig- 8, 9, 10, 11, 12, 13: Screen Captured For All Rounds during Authentication
Fig -8
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1938
Fig -9
Fig -10
Fig -11
Fig-12
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1939
Fig -13
for linking and organizing people to share knowledge and information. Generally, in social network site peoplecansharetheir
ideas, digital photos, and videos, posts to inform others about real world activities.
4. OVERALL CONCEPT
4.1 PIN-BASED MOBILE AUTHENTICATION METHOD FOR SENSITIVE OPERATIONS.
The PIN-based mechanism to give security to versatile confirmation. For instance, consider a twitter account it's one of the
informal organizations. The customer can prepare to get to the record before itself its need to outline the record with the
objective that require a minute factor check by adding a phone numbertothetwitteraccountprofile. Whenwemarkedintothe
twitter account and after enter the passageway mystery word, the customer asked for to enter a six-digit PIN number got by
customer enlisted flexible number through text. Once entered the correct PIN number the customer can proficient access the
twitter account. In any case, the spyware attempts to get to the portable to get the PIN number and attempttologin thisrecord
without the client assertion.
4.2 BRIGHTNESS AS SECURITY MECHANISM
Fig -13: Proposed Authentication Concept
The Bright pass method is one of the screen capture and recording techniques which does not change the screen brightness
(SB) setting into the smartphones. Using Bright pass mechanism captured the brightness level which is displayed on the
smartphones and compare with visually. The versatile malware tries to get to portable OS and get screen splendour esteem.
We utilized the Brightness of brilliant pass application without changing the framework's splendour esteems and store the
esteem subtly in the protected components when the client cooperates with the application to enter the PIN. The Bright pass
mechanism provides sufficient security against the attacks.
5. SECURITY ANALYSIS
Here we use Bright pass mechanism against shoulder surfing attack, man-in middle attack, Brute force attacks, Dictionary
attacks, spyware attack, side channel attack
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1940
5.1 SHOULDER SURFING ATTACK
Shoulder surfing attack is one of the immediate perceptions strategies. For example, by using one shoulder to get data. It is
used to get secret key, pin, security code of the individual. In Proposed System we use pin passage technique and joystick to
select the symbol which is used as password in a secret manner. This will avoid shoulder surfing attack.
5.2 MAN-IN MIDDLE ATTACK
Man-in middle attack is a conversation between 2 parties and both are accessing the Information and send to each others. In
Proposed System we can avoid this attack, entering six-digit PIN numberbyuserandservergeneratessix-digit binarynumber.
To prevent information’s from main-in middle attacks, Base64 and HMAC algorithms are used. This two algorithms provide
encryption and signature values.
Chart -1: Comparison with Existing System
5.3 BRUTE FORCE AND DICTIONARY ATTACK
Both a brute force attack and dictionary attack are guessing attacks, they are not directly looking for a flaw or bypass. This
attack either can be an online attack or offline attack. A Brute force attack is a secret key used to get client watchword. This
method contains most of the basic word as secret key and check remaining word withall thepossibilitiesuntil itgetmatched.A
Dictionary attack is a guessing attack which uses precompiled listofoptions.Ratherthantryingeveryoption,onlytrycomplete
options which are likely to work.
5.4 SIDE CHANNEL ATTACK
This system contains 2 elements to avoid side channel attack. One is the randomization of pin digit for authentication and
second one use of screen brightness in secure way. Bright pass mechanism is divided into 2 categories of security
5.5 SPYWARE ATTACK
It is the type of the malware attack install in our system without the knowledge of user. Spyware isusedtogettheinformation
about the password, credit card, banking credential using internet. Spyware is mostly used to collect the information fromthe
mobile in a secret way. This attack can be avoided by using Bright pass mechanism.
5.6 SMART PHONE THEFT
Even though the smart phones are stolen by someone, it is impossible to access by them with the wrong password. The
authentication is provided for all user account by verifying with the help of password. It provides security for all users by
preserving and protecting the data from unauthorized person.
6. CONCLUSIONS
In the modern era, the computerized world, including websites, applications, emails, and social networksbecamea significant
part of our life. Due to the vast amount of information users publish on social networks, these platforms both aggregate and
display a wealth of valuable information about users and their activity, that can be exploited by various hostile and malicious
players.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1941
Therefore the proposed system uses a unique logic based and brightness based authentication mechanism capable of
enhancing the security of identity confirmation PIN codes withouttheneedfortheuser torememberanadditional confidential
value or to solve an arithmetic or visual cognitive task. This method introduces a new input value that is dynamic at every
usage assigning a PIN with an interface element that cannot be capture by spyware. The security analysis shows that the
proposed scheme is resilient against side channel attacks,Shouldersurfingattacks,Maninmiddleattacksandspywareattacks.
From the experimental analysis this BrightPass mechanism offers low error rates in authentication part. Thus thistechnology
creates a positive impact in the social networking environment. Finally, this mechanism can be extended for the secureonline
transaction protected by PIN verification code.
7. REFERENCES
[1] Meriem Guerar, Mauro Migliardi, Alessio Merio, Mohamed Benmohammed, Francesco Palmieri, and Aniello Castiglione,
“Using Screen brightness to improve security in mobile social network access”Member, IEEE Transactionsondependableand
secure computing, VOL. 15, NO. 4, JULY/AUGUST 2018
[2] Saranya, R., Gowri, S., Monisha, S., Vigneshwari, S., “An ontological approach for originating data services with hazy
semantics”, Indian Journal of Science and Technology-0974-5645, Vol 9(23), June 2016/1-6 Scopus
[3] T.Wang, Y.Chen, M.Zhang, Y.Chen, and H.Snoussi, “Internal transfer learning for improving performance in human action
recognition for small datasets,” IEEE Access, vol.5, pp. 17627-17633.
[4] M. Korakakis, E.Magkos and Ph.Mylonas, “Automated CPATCHA solving:AnEmpirical ComparisonofselectedTechniques”,
2014 9th International Workshop on semantic and social Media Adaptation and Personalisation.Doi:10.1109/SMAP.2014.29
[5] D.Pequegnot, L.Cart-lamy, A.Thomas, T.Tigeon, J.Iguchi-cartigny, Jean-Louis Lanet, “A Security Mechanism to Increase
Confidence in M-Transaction”.
[6] Sandipkumar M Vaniya, B. Bharathi, “Exploring object segmentation methods in visual surveillance for human activity
recognition”, International Conference on Global Trends in Signal Processing,InformationComputingandCommunication,pp.
520-525, 2016.
[7] Bandaru R, Albert Mayan J (2016), “Novel approach for whole test suite generation using metamorphic relations”, Indian
Journal of Science and Technology, Vol 9, No.10, pp.1-7.
[8] Vigneshwari. S and Aramudhan. M (2015), “Personalized cross ontological framework for secured document retrieval in
the cloud”, National Academy Science Letters-India, Vol. 38 (5), pp. 421–424.
[9] Kalpana, S., Vigneshwari, S, “Selecting multiview point similarity from different methods of similarity measureto perform
document comparison”, Indian Journal of Science and Technology-0974-5645, Vol 9(10),March 2016/1-6. Scopus.
[10] Goodfellow, I.J., Bulatov, Y., Ibarz, J., Arnoud, S., Shet, V: “Multi-digit number recognition from street view imagery using
deep convolutional neural networks” ICLR (2014)

Contenu connexe

Tendances

Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for SmartphonesComparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphonesiosrjce
 
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing AttacksIRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing AttacksIRJET Journal
 
IRJET- Real-Time Face Tracking for Password Authentication
IRJET- Real-Time Face Tracking for Password AuthenticationIRJET- Real-Time Face Tracking for Password Authentication
IRJET- Real-Time Face Tracking for Password AuthenticationIRJET Journal
 
IRJET- A Methodology: Iot Based Drowsy Driving Warning and Traffic Collis...
IRJET-  	  A Methodology: Iot Based Drowsy Driving Warning and Traffic Collis...IRJET-  	  A Methodology: Iot Based Drowsy Driving Warning and Traffic Collis...
IRJET- A Methodology: Iot Based Drowsy Driving Warning and Traffic Collis...IRJET Journal
 
Analyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - ChinaAnalyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - ChinaEMC
 
Two aspect authentication system using secure mobile
Two aspect authentication system using secure mobileTwo aspect authentication system using secure mobile
Two aspect authentication system using secure mobileUvaraj Shan
 
Why Passwords are not strong enough
Why Passwords are not strong enoughWhy Passwords are not strong enough
Why Passwords are not strong enoughEMC
 
IRJET - Detecting Spiteful Accounts in Social Network
IRJET - Detecting Spiteful Accounts in Social NetworkIRJET - Detecting Spiteful Accounts in Social Network
IRJET - Detecting Spiteful Accounts in Social NetworkIRJET Journal
 
Internet of Things, Examples and Issues
Internet of Things, Examples and IssuesInternet of Things, Examples and Issues
Internet of Things, Examples and IssuesIRJET Journal
 
A women secure mobile app for emergency usage (go safe app)
A women secure mobile app for emergency usage (go safe app)A women secure mobile app for emergency usage (go safe app)
A women secure mobile app for emergency usage (go safe app)eSAT Journals
 
Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server Davide Cioccia
 
IRJET- Women Safety Application using Firebase and Geocoder
IRJET-  	  Women Safety Application using Firebase and GeocoderIRJET-  	  Women Safety Application using Firebase and Geocoder
IRJET- Women Safety Application using Firebase and GeocoderIRJET Journal
 
Anomaly Detection using String Analysis for Android Malware Detection - CISIS...
Anomaly Detection using String Analysis for Android Malware Detection - CISIS...Anomaly Detection using String Analysis for Android Malware Detection - CISIS...
Anomaly Detection using String Analysis for Android Malware Detection - CISIS...Carlos Laorden
 
ANDROID APPLICATION FOR PASSWORDLESS LOGIN FOR WEB APPLICATIONS
ANDROID APPLICATION FOR PASSWORDLESS LOGIN FOR WEB APPLICATIONSANDROID APPLICATION FOR PASSWORDLESS LOGIN FOR WEB APPLICATIONS
ANDROID APPLICATION FOR PASSWORDLESS LOGIN FOR WEB APPLICATIONSJournal For Research
 
Application Security framework for Mobile App Development in Enterprise Setup
Application Security framework for Mobile App Development in Enterprise SetupApplication Security framework for Mobile App Development in Enterprise Setup
Application Security framework for Mobile App Development in Enterprise SetupEswar Publications
 
“Design and Detection of Mobile Botnet Attacks”
“Design and Detection of Mobile Botnet Attacks”“Design and Detection of Mobile Botnet Attacks”
“Design and Detection of Mobile Botnet Attacks”iosrjce
 
IRJET- Review of Fingerprint based Automobile Anti-Theft System
IRJET- Review of Fingerprint based Automobile Anti-Theft SystemIRJET- Review of Fingerprint based Automobile Anti-Theft System
IRJET- Review of Fingerprint based Automobile Anti-Theft SystemIRJET Journal
 
RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014EMC
 

Tendances (20)

Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for SmartphonesComparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphones
 
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing AttacksIRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
 
IRJET- Real-Time Face Tracking for Password Authentication
IRJET- Real-Time Face Tracking for Password AuthenticationIRJET- Real-Time Face Tracking for Password Authentication
IRJET- Real-Time Face Tracking for Password Authentication
 
Security News bytes October 2013
Security News bytes  October 2013Security News bytes  October 2013
Security News bytes October 2013
 
IRJET- A Methodology: Iot Based Drowsy Driving Warning and Traffic Collis...
IRJET-  	  A Methodology: Iot Based Drowsy Driving Warning and Traffic Collis...IRJET-  	  A Methodology: Iot Based Drowsy Driving Warning and Traffic Collis...
IRJET- A Methodology: Iot Based Drowsy Driving Warning and Traffic Collis...
 
Analyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - ChinaAnalyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - China
 
Two aspect authentication system using secure mobile
Two aspect authentication system using secure mobileTwo aspect authentication system using secure mobile
Two aspect authentication system using secure mobile
 
Why Passwords are not strong enough
Why Passwords are not strong enoughWhy Passwords are not strong enough
Why Passwords are not strong enough
 
IRJET - Detecting Spiteful Accounts in Social Network
IRJET - Detecting Spiteful Accounts in Social NetworkIRJET - Detecting Spiteful Accounts in Social Network
IRJET - Detecting Spiteful Accounts in Social Network
 
Internet of Things, Examples and Issues
Internet of Things, Examples and IssuesInternet of Things, Examples and Issues
Internet of Things, Examples and Issues
 
A women secure mobile app for emergency usage (go safe app)
A women secure mobile app for emergency usage (go safe app)A women secure mobile app for emergency usage (go safe app)
A women secure mobile app for emergency usage (go safe app)
 
Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server
 
IRJET- Women Safety Application using Firebase and Geocoder
IRJET-  	  Women Safety Application using Firebase and GeocoderIRJET-  	  Women Safety Application using Firebase and Geocoder
IRJET- Women Safety Application using Firebase and Geocoder
 
Anomaly Detection using String Analysis for Android Malware Detection - CISIS...
Anomaly Detection using String Analysis for Android Malware Detection - CISIS...Anomaly Detection using String Analysis for Android Malware Detection - CISIS...
Anomaly Detection using String Analysis for Android Malware Detection - CISIS...
 
321
321321
321
 
ANDROID APPLICATION FOR PASSWORDLESS LOGIN FOR WEB APPLICATIONS
ANDROID APPLICATION FOR PASSWORDLESS LOGIN FOR WEB APPLICATIONSANDROID APPLICATION FOR PASSWORDLESS LOGIN FOR WEB APPLICATIONS
ANDROID APPLICATION FOR PASSWORDLESS LOGIN FOR WEB APPLICATIONS
 
Application Security framework for Mobile App Development in Enterprise Setup
Application Security framework for Mobile App Development in Enterprise SetupApplication Security framework for Mobile App Development in Enterprise Setup
Application Security framework for Mobile App Development in Enterprise Setup
 
“Design and Detection of Mobile Botnet Attacks”
“Design and Detection of Mobile Botnet Attacks”“Design and Detection of Mobile Botnet Attacks”
“Design and Detection of Mobile Botnet Attacks”
 
IRJET- Review of Fingerprint based Automobile Anti-Theft System
IRJET- Review of Fingerprint based Automobile Anti-Theft SystemIRJET- Review of Fingerprint based Automobile Anti-Theft System
IRJET- Review of Fingerprint based Automobile Anti-Theft System
 
RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014
 

Similaire à IRJET- Authentication System in Social Networks

IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET-  	  Technical Review of different Methods for Multi Factor AuthenticationIRJET-  	  Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor AuthenticationIRJET Journal
 
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET Journal
 
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET Journal
 
IRJET- Enhancement in Netbanking Security
IRJET-  	  Enhancement in Netbanking SecurityIRJET-  	  Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking SecurityIRJET Journal
 
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET -  	  Cyber Security Threats and Measures in Context with IoTIRJET -  	  Cyber Security Threats and Measures in Context with IoT
IRJET - Cyber Security Threats and Measures in Context with IoTIRJET Journal
 
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...IJECEIAES
 
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...IRJET Journal
 
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative AnalysisCyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative AnalysisIRJET Journal
 
IRJET - Application for Public Issues
IRJET -  	  Application for Public IssuesIRJET -  	  Application for Public Issues
IRJET - Application for Public IssuesIRJET Journal
 
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear AttacksIRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear AttacksIRJET Journal
 
IRJET- Phishing Website Detection based on Machine Learning
IRJET- Phishing Website Detection based on Machine LearningIRJET- Phishing Website Detection based on Machine Learning
IRJET- Phishing Website Detection based on Machine LearningIRJET Journal
 
Color Code PIN Authentication System Using Multi-TouchTechnology
Color Code PIN Authentication System Using Multi-TouchTechnologyColor Code PIN Authentication System Using Multi-TouchTechnology
Color Code PIN Authentication System Using Multi-TouchTechnologyIRJET Journal
 
IRJET- Iot based Interactive Display Unit using Raspberry PI
IRJET- Iot based Interactive Display Unit using Raspberry PIIRJET- Iot based Interactive Display Unit using Raspberry PI
IRJET- Iot based Interactive Display Unit using Raspberry PIIRJET Journal
 
IRJET- A Mobile Payment System Based on Face Recognition
IRJET- A Mobile Payment System Based on Face RecognitionIRJET- A Mobile Payment System Based on Face Recognition
IRJET- A Mobile Payment System Based on Face RecognitionIRJET Journal
 
IRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET- A Shoulder Surfing Resistance using HMAC AlgorithmIRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET- A Shoulder Surfing Resistance using HMAC AlgorithmIRJET Journal
 
IRJET- End to End Message Encryption using Biometrics
IRJET-  	  End to End Message Encryption using BiometricsIRJET-  	  End to End Message Encryption using Biometrics
IRJET- End to End Message Encryption using BiometricsIRJET Journal
 
IRJET- A Quality Watch Android Based Application for Monitoring Robotic A...
IRJET-  	  A Quality Watch Android Based Application for Monitoring Robotic A...IRJET-  	  A Quality Watch Android Based Application for Monitoring Robotic A...
IRJET- A Quality Watch Android Based Application for Monitoring Robotic A...IRJET Journal
 
IRJET- E-Grievance: Centralized System for Municipal Corporation to Citizens ...
IRJET- E-Grievance: Centralized System for Municipal Corporation to Citizens ...IRJET- E-Grievance: Centralized System for Municipal Corporation to Citizens ...
IRJET- E-Grievance: Centralized System for Municipal Corporation to Citizens ...IRJET Journal
 
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET-  	  Secure Online Payment with Facial Recognition using CNNIRJET-  	  Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNNIRJET Journal
 
IRJET- Secured Authentication using Image Shield Protection and Database ...
IRJET-  	  Secured Authentication using Image Shield Protection and Database ...IRJET-  	  Secured Authentication using Image Shield Protection and Database ...
IRJET- Secured Authentication using Image Shield Protection and Database ...IRJET Journal
 

Similaire à IRJET- Authentication System in Social Networks (20)

IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET-  	  Technical Review of different Methods for Multi Factor AuthenticationIRJET-  	  Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor Authentication
 
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
 
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
 
IRJET- Enhancement in Netbanking Security
IRJET-  	  Enhancement in Netbanking SecurityIRJET-  	  Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking Security
 
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET -  	  Cyber Security Threats and Measures in Context with IoTIRJET -  	  Cyber Security Threats and Measures in Context with IoT
IRJET - Cyber Security Threats and Measures in Context with IoT
 
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
 
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
 
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative AnalysisCyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
 
IRJET - Application for Public Issues
IRJET -  	  Application for Public IssuesIRJET -  	  Application for Public Issues
IRJET - Application for Public Issues
 
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear AttacksIRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
 
IRJET- Phishing Website Detection based on Machine Learning
IRJET- Phishing Website Detection based on Machine LearningIRJET- Phishing Website Detection based on Machine Learning
IRJET- Phishing Website Detection based on Machine Learning
 
Color Code PIN Authentication System Using Multi-TouchTechnology
Color Code PIN Authentication System Using Multi-TouchTechnologyColor Code PIN Authentication System Using Multi-TouchTechnology
Color Code PIN Authentication System Using Multi-TouchTechnology
 
IRJET- Iot based Interactive Display Unit using Raspberry PI
IRJET- Iot based Interactive Display Unit using Raspberry PIIRJET- Iot based Interactive Display Unit using Raspberry PI
IRJET- Iot based Interactive Display Unit using Raspberry PI
 
IRJET- A Mobile Payment System Based on Face Recognition
IRJET- A Mobile Payment System Based on Face RecognitionIRJET- A Mobile Payment System Based on Face Recognition
IRJET- A Mobile Payment System Based on Face Recognition
 
IRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET- A Shoulder Surfing Resistance using HMAC AlgorithmIRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET- A Shoulder Surfing Resistance using HMAC Algorithm
 
IRJET- End to End Message Encryption using Biometrics
IRJET-  	  End to End Message Encryption using BiometricsIRJET-  	  End to End Message Encryption using Biometrics
IRJET- End to End Message Encryption using Biometrics
 
IRJET- A Quality Watch Android Based Application for Monitoring Robotic A...
IRJET-  	  A Quality Watch Android Based Application for Monitoring Robotic A...IRJET-  	  A Quality Watch Android Based Application for Monitoring Robotic A...
IRJET- A Quality Watch Android Based Application for Monitoring Robotic A...
 
IRJET- E-Grievance: Centralized System for Municipal Corporation to Citizens ...
IRJET- E-Grievance: Centralized System for Municipal Corporation to Citizens ...IRJET- E-Grievance: Centralized System for Municipal Corporation to Citizens ...
IRJET- E-Grievance: Centralized System for Municipal Corporation to Citizens ...
 
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET-  	  Secure Online Payment with Facial Recognition using CNNIRJET-  	  Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNN
 
IRJET- Secured Authentication using Image Shield Protection and Database ...
IRJET-  	  Secured Authentication using Image Shield Protection and Database ...IRJET-  	  Secured Authentication using Image Shield Protection and Database ...
IRJET- Secured Authentication using Image Shield Protection and Database ...
 

Plus de IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

Plus de IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Dernier

TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHTEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHSneha Padhiar
 
Cost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionCost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionSneha Padhiar
 
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfChristianCDAM
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsResearcher Researcher
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork
 
Turn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxTurn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxStephen Sitton
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating SystemRashmi Bhat
 
CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfCS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfBalamuruganV28
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substationstephanwindworld
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Erbil Polytechnic University
 
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSneha Padhiar
 
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Romil Mishra
 
Python Programming for basic beginners.pptx
Python Programming for basic beginners.pptxPython Programming for basic beginners.pptx
Python Programming for basic beginners.pptxmohitesoham12
 
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdfHafizMudaserAhmad
 
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书rnrncn29
 
OOP concepts -in-Python programming language
OOP concepts -in-Python programming languageOOP concepts -in-Python programming language
OOP concepts -in-Python programming languageSmritiSharma901052
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingBootNeck1
 
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfComprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfalene1
 

Dernier (20)

TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHTEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
 
Cost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionCost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based question
 
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdf
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending Actuators
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
 
Turn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxTurn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptx
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating System
 
CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfCS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdf
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substation
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
 
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
 
Designing pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptxDesigning pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptx
 
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________
 
Python Programming for basic beginners.pptx
Python Programming for basic beginners.pptxPython Programming for basic beginners.pptx
Python Programming for basic beginners.pptx
 
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf
 
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
 
OOP concepts -in-Python programming language
OOP concepts -in-Python programming languageOOP concepts -in-Python programming language
OOP concepts -in-Python programming language
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event Scheduling
 
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfComprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
 

IRJET- Authentication System in Social Networks

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1935 AUTHENTICATION SYSTEM IN SOCIAL NETWORKS A.R Preethi1, M.Gayathri2, P.Jayasri3, J.Jenny Sarah4 1Assistant Professor, Dept. of Information Technology, Jeppiaar SRR Engineering College, Tamil Nadu 2,3,4UG Student, Dept. of Information Technology, Jeppiaar SRR Engineering College, Tamil Nadu ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Secure Authentication is very important in today’s digital world, Mobile devices use sophisticated applications that makes life easier and more relax and convenient for users. Such applications, may involve mobile ticketing, identification, access control operations, etc., are often accessible through social network aggregators. Mobiles are the database for any person’s personal information. Therefore it turns as an attractive target for the spyware injections. Such malware software’s can steal the user’s credentials and valuable information’s from their accounts, perform unauthorized mobile access to social networkservices without the user’s consent. The main aim of this project is to propose the smart way authentication by using a unique logic on authentication and by using screen brightness of android mobiles in order to avoid various types of attacks. We compare BrightPass with existing schemes, in order to show its usability and security within the social network arena. Furthermore, we empirically assess the security of BrightPass through experimentation. Our tests indicate that BrightPass protects the PIN code against automatic submissions carried out by malware while granting fast authentication phases and reduced error rates. Key Words: Authentication, Mobiles, Social networks, Malware attacks, Brightpass scheme 1. INTRODUCTION Social networks are one of the most important communication platforms of the last 15 years with high socio-economic value. Social networks are an inherent part of today’s internet and used by more than a billion people worldwide. Over the last few years mobile communication devices have becoming powerful andtodaymany ofthemsupportapplicationbeing installedand executed on the device. Mobile devices use sophisticated applications that make life easier and more relax and convenient for users. Because of this people expect these social networking servicestobeavailableon theirmobiledevices.Itallowsexchange of user-generated content like data, pictures, and videos. Unfortunately, as the importance of these platform rises,theinterest of the hackers on them increases well, so that theft of user informationandauthenticationbreaches, become problemsinsocial networking area. Many attacks are successful in accessing social networks accounts and the authentication mechanism is not efficient and vulnerable to automated attacks. Many of the top most social networking services providers such as google, facebook, yahoo, twitter, snapchat and dropbox already allow you to optionally require second authentication.Unfortunately, the mobile devices used for gaining access are often vulnerable to several kind of malware. Mobile malware is a malicious software that is specifically built to attack mobile phone or smartphone system. This is kind of malware can be abletoretrieve all type of user information such as passwords and PIN codes which are used for perform authentication in social networking applications.Hence,the presence of malwareinmobiledevicesreducesimpactonsocial networks.Toovercome malwareattack numerous authentication methods are discovered. But those processes are takes long authentication time, having high error rates so they are low acceptance among the users. In this paper we discuss about BrightPass which enhancing the security and protection it is the simplest effective technique consist of two screen captures when brightness is high have to enter correct pin digit and when brightnessislowhavetoenter the fake one. Compare with existing techniquesBrightPassincreasesuserconfidenceandcreategreatimpactonsocial network access. It provides high security for mobile and sensitive applications against different types of malware attack. 2. RELATED WORK Nowadays smart phones are built using mobile operating system that allows them to run application with rich and modern functionality. This type of smart phone are designed with newcommunicationinterfacetocarryoutsecuritycritical operations which can access personal data in application using alpha numeric password.Thissystemleadstospreadacrossonlinemarket places and fool the user. This approach helps in preventing the spyware stealing the user credential. Yi.et.al. proposed a Pass Window which uses PIN digits and pre -selected image called pass icon. Chow et al. introduce idea of showing special CAPTHCA into a clickable CAPTHCA. These frameworks do not depend on console input the client is requested to choose few component in the network that match the test case.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1936 Fig-1:ReCAPTCHA Fig -2: Clickable CAPTCHA Fig -3: Drawing CAPTCHA Fig -4: AccCAPTCHA Kim et al. proposed a Password authentication scheme based ondummy-keycalledFakePIN whichconsistsofalpha numeric text and password as a secret value. Asirra that displays 12 images of butterflies and asks users to select all cat images among them. Shirali-Shahreza et al. proposed CAPTCHA mechanism for mobile phones called drawing CAPTCHA. In this method dot are displayed on the screen.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1937 Liao et al. proposed a new CAPTCHA scheme based on game logic and human recognition. Here the user as to play a rolling ball game to pass the CAPTCHA challenges. 3. THE BRIGHTPASS CONCEPT This approach contains a right PIN Number in a 6 digit format which is stored in a larger way. The request of PIN digitposition created by SE and further imparted to the client exchanging circle’s splendour esteems is high client must enter the right PIN digit whether it looks dim client must enter the deceptive lie PIN digit. This method is used by user and security elements to know the real pin digit with its positions. 3.1 REGISTRATION AND LOGIN The user creates an account and registers their password to provide user’s information such as phone number, e-maid id and location. If someone tries to access your account the server generates four digits PIN number for authenticating user account. The registered mobile no and e-mail id will get alert about your account in some cases 3.2 USER VALIDATION It is a new PIN-entry method. The basic layout of this method comprises a vertical array of digits from 0 to 9, juxtaposed with another array of ten familiar symbols such as + and / etc. These symbols are moveable in the vertical order usingup anddown buttons. At first, decide the symbol for the first digit of the PIN. After the first round when the symbol is decided, then in the consecutive rounds enter the second, third & fourth digit of the PIN. 3.3 IMPLEMENTING SCREEN BRIGHTNESS FOR AUTHENTICATION Spyware attack will be avoided by proposing the idea that uses the screen brightness as an authentication tool. For authentication the server generates the 6 digit binary value. Based on thebinarydigit thebrightnessofthescreengetschanged to high or low. If the screen brightness is high the user should input the correct PIN digit. Else the user should give the wrong or random PIN number. This proposed work will remove the digits which inserted while the screen brightness is low and takes the digit which is inserted when the screen brightness is high authentication. The server get the signature of user generated PIN and generate the signature value for the Original PIN and compares both the signatures. If the Signatures are equal the user can access their Profile. If not user access their profile. 3.4 SHARING INFORMATION Social network is an online platform which helps the people to share personal orcareer information.Thesesocial networksare distributed across many platforms Fig- 8, 9, 10, 11, 12, 13: Screen Captured For All Rounds during Authentication Fig -8
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1938 Fig -9 Fig -10 Fig -11 Fig-12
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1939 Fig -13 for linking and organizing people to share knowledge and information. Generally, in social network site peoplecansharetheir ideas, digital photos, and videos, posts to inform others about real world activities. 4. OVERALL CONCEPT 4.1 PIN-BASED MOBILE AUTHENTICATION METHOD FOR SENSITIVE OPERATIONS. The PIN-based mechanism to give security to versatile confirmation. For instance, consider a twitter account it's one of the informal organizations. The customer can prepare to get to the record before itself its need to outline the record with the objective that require a minute factor check by adding a phone numbertothetwitteraccountprofile. Whenwemarkedintothe twitter account and after enter the passageway mystery word, the customer asked for to enter a six-digit PIN number got by customer enlisted flexible number through text. Once entered the correct PIN number the customer can proficient access the twitter account. In any case, the spyware attempts to get to the portable to get the PIN number and attempttologin thisrecord without the client assertion. 4.2 BRIGHTNESS AS SECURITY MECHANISM Fig -13: Proposed Authentication Concept The Bright pass method is one of the screen capture and recording techniques which does not change the screen brightness (SB) setting into the smartphones. Using Bright pass mechanism captured the brightness level which is displayed on the smartphones and compare with visually. The versatile malware tries to get to portable OS and get screen splendour esteem. We utilized the Brightness of brilliant pass application without changing the framework's splendour esteems and store the esteem subtly in the protected components when the client cooperates with the application to enter the PIN. The Bright pass mechanism provides sufficient security against the attacks. 5. SECURITY ANALYSIS Here we use Bright pass mechanism against shoulder surfing attack, man-in middle attack, Brute force attacks, Dictionary attacks, spyware attack, side channel attack
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1940 5.1 SHOULDER SURFING ATTACK Shoulder surfing attack is one of the immediate perceptions strategies. For example, by using one shoulder to get data. It is used to get secret key, pin, security code of the individual. In Proposed System we use pin passage technique and joystick to select the symbol which is used as password in a secret manner. This will avoid shoulder surfing attack. 5.2 MAN-IN MIDDLE ATTACK Man-in middle attack is a conversation between 2 parties and both are accessing the Information and send to each others. In Proposed System we can avoid this attack, entering six-digit PIN numberbyuserandservergeneratessix-digit binarynumber. To prevent information’s from main-in middle attacks, Base64 and HMAC algorithms are used. This two algorithms provide encryption and signature values. Chart -1: Comparison with Existing System 5.3 BRUTE FORCE AND DICTIONARY ATTACK Both a brute force attack and dictionary attack are guessing attacks, they are not directly looking for a flaw or bypass. This attack either can be an online attack or offline attack. A Brute force attack is a secret key used to get client watchword. This method contains most of the basic word as secret key and check remaining word withall thepossibilitiesuntil itgetmatched.A Dictionary attack is a guessing attack which uses precompiled listofoptions.Ratherthantryingeveryoption,onlytrycomplete options which are likely to work. 5.4 SIDE CHANNEL ATTACK This system contains 2 elements to avoid side channel attack. One is the randomization of pin digit for authentication and second one use of screen brightness in secure way. Bright pass mechanism is divided into 2 categories of security 5.5 SPYWARE ATTACK It is the type of the malware attack install in our system without the knowledge of user. Spyware isusedtogettheinformation about the password, credit card, banking credential using internet. Spyware is mostly used to collect the information fromthe mobile in a secret way. This attack can be avoided by using Bright pass mechanism. 5.6 SMART PHONE THEFT Even though the smart phones are stolen by someone, it is impossible to access by them with the wrong password. The authentication is provided for all user account by verifying with the help of password. It provides security for all users by preserving and protecting the data from unauthorized person. 6. CONCLUSIONS In the modern era, the computerized world, including websites, applications, emails, and social networksbecamea significant part of our life. Due to the vast amount of information users publish on social networks, these platforms both aggregate and display a wealth of valuable information about users and their activity, that can be exploited by various hostile and malicious players.
  • 7. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1941 Therefore the proposed system uses a unique logic based and brightness based authentication mechanism capable of enhancing the security of identity confirmation PIN codes withouttheneedfortheuser torememberanadditional confidential value or to solve an arithmetic or visual cognitive task. This method introduces a new input value that is dynamic at every usage assigning a PIN with an interface element that cannot be capture by spyware. The security analysis shows that the proposed scheme is resilient against side channel attacks,Shouldersurfingattacks,Maninmiddleattacksandspywareattacks. From the experimental analysis this BrightPass mechanism offers low error rates in authentication part. Thus thistechnology creates a positive impact in the social networking environment. Finally, this mechanism can be extended for the secureonline transaction protected by PIN verification code. 7. REFERENCES [1] Meriem Guerar, Mauro Migliardi, Alessio Merio, Mohamed Benmohammed, Francesco Palmieri, and Aniello Castiglione, “Using Screen brightness to improve security in mobile social network access”Member, IEEE Transactionsondependableand secure computing, VOL. 15, NO. 4, JULY/AUGUST 2018 [2] Saranya, R., Gowri, S., Monisha, S., Vigneshwari, S., “An ontological approach for originating data services with hazy semantics”, Indian Journal of Science and Technology-0974-5645, Vol 9(23), June 2016/1-6 Scopus [3] T.Wang, Y.Chen, M.Zhang, Y.Chen, and H.Snoussi, “Internal transfer learning for improving performance in human action recognition for small datasets,” IEEE Access, vol.5, pp. 17627-17633. [4] M. Korakakis, E.Magkos and Ph.Mylonas, “Automated CPATCHA solving:AnEmpirical ComparisonofselectedTechniques”, 2014 9th International Workshop on semantic and social Media Adaptation and Personalisation.Doi:10.1109/SMAP.2014.29 [5] D.Pequegnot, L.Cart-lamy, A.Thomas, T.Tigeon, J.Iguchi-cartigny, Jean-Louis Lanet, “A Security Mechanism to Increase Confidence in M-Transaction”. [6] Sandipkumar M Vaniya, B. Bharathi, “Exploring object segmentation methods in visual surveillance for human activity recognition”, International Conference on Global Trends in Signal Processing,InformationComputingandCommunication,pp. 520-525, 2016. [7] Bandaru R, Albert Mayan J (2016), “Novel approach for whole test suite generation using metamorphic relations”, Indian Journal of Science and Technology, Vol 9, No.10, pp.1-7. [8] Vigneshwari. S and Aramudhan. M (2015), “Personalized cross ontological framework for secured document retrieval in the cloud”, National Academy Science Letters-India, Vol. 38 (5), pp. 421–424. [9] Kalpana, S., Vigneshwari, S, “Selecting multiview point similarity from different methods of similarity measureto perform document comparison”, Indian Journal of Science and Technology-0974-5645, Vol 9(10),March 2016/1-6. Scopus. [10] Goodfellow, I.J., Bulatov, Y., Ibarz, J., Arnoud, S., Shet, V: “Multi-digit number recognition from street view imagery using deep convolutional neural networks” ICLR (2014)