Controlling Data Dictionary Attacks using Graphical password and Data Hiding in Video
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
seminar surveyer
Active In SP
**

Posts: 3,541
Joined: Sep 2010
#1
04-01-2011, 01:28 PM





Abstract


Aim of the project and implimentation is to implement the Security features that can avoid Data Dictionary attacks in both the server and transmission part. The first part is to control the data dictionary attacks that occur in direct internal way to the server. Graphical based password authentication is implemented where Pixel co-ordinates are fixed as the password. CCP (cued click points) in added for more security. The user can click the pixel points and login to the server. The user is permitted to click the pixel only trice, if the proper pixel co-ordinates with the set limit the authentication will be blocked and need to contact the admin to activation. So this process leads the hackers more tedious to enter server.
The second part is to control the Data Dictionary attack in the transmission part where the secure data transmitted from the server to client / server to server will be hacked by the intruders. Here data hiding in video streams in proposed to control the attack. The secure data to be transmitted is encrypted and hidden inside the video file and transmitted. So it will not create more paths for the intruders to guess the content and transmission rate will be faster.


Requirements:

• Microsoft XP
• C#.Net
• SQL Server 2005




Reply
seminar addict
Super Moderator
******

Posts: 6,592
Joined: Jul 2011
#2
10-02-2012, 10:53 AM

to get information about the topic Graphical Password Authentication using Cued Click Points full report ,ppt and related topic refer the link bellow

topicideashow-to-graphical-password-authentication-using-cued-click-points-ccp

topicideashow-to-graphical-password-authentication-using-cued-click-points-ccp--16815

topicideashow-to-controlling-data-dictionary-attacks-using-graphical-password-and-data-hiding-in-video
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Graphical Password Authentication using Cued Click Points (CCP) project topics 14 13,391 31-10-2016, 02:06 PM
Last Post: Dhanabhagya
  Implementation of ATM Security by Using Fingerprint recognition and GSM seminar tips 1 815 01-04-2016, 04:08 PM
Last Post: mkaasees
  Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing PPT project girl 1 1,027 21-10-2015, 01:52 PM
Last Post: Guest
  Maximum Power Point Tracking using Perturb and Observe Algorithm For a PV System seminar flower 8 1,948 17-03-2015, 05:40 AM
Last Post: GT Racing
  Data Hiding in Video using Least Bit Technique seminar tips 1 603 18-10-2014, 05:40 AM
Last Post: wayan sukadana
  data mining full report project report tiger 35 199,297 03-10-2014, 04:30 AM
Last Post: kwfEXGu
  A Novel Data Embedding Method Using Adaptive Pixel Pair Matching Report project girl 4 1,879 18-09-2014, 03:49 PM
Last Post: Radhika.m
  Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storag seminar flower 3 3,197 23-05-2014, 10:04 AM
Last Post: seminar project topic
  ThreeDimensional Password for More Secure Authentication pdf project girl 1 736 11-05-2014, 09:43 PM
Last Post: 1pradeep1
  DEFENDING AGAINST SYBIL ATTACKS USING SYBILLIMIT PROTOCOL smart paper boy 3 1,702 01-03-2014, 01:01 PM
Last Post: sujivijay