79115c0510c455c999c6f78937fb646fraudc.pptx

SahithBeats 15 views 20 slides Jul 20, 2024
Slide 1
Slide 1 of 20
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20

About This Presentation

Fraud prevention


Slide Content

E-Fraud Prevention Based on Self
Authentication of e-Documents

Prepared by,
M.Sujitha
M.Swathi
M.Vaishnavi
S.Ravali
5.5ana Sareen

Contents

Objective

isting system

Problems in existing system

Advantages in proposed system
System requirements

Modules

= Output Screens

= Conclusion

Objective

The main objective of this project is to prevent e-Fraud in which a image is
encrypted with a floating point cipher using a convolution operation and then
output will generate in a image cipher text.

The output is then ‘embedded’ in a host image to hide the encrypted
information.

Decryption is accomplished by: (i) extracting the binary image from the host
image; (li) correlating the result with the original cipher.

In principle, any cipher generator can be used for this purpose and the
method has been designed to operate with images.

The approach has a variety of applications and in this paper, we focus on the
authentication and self-authentication of e-dacuments (letters and certificates,
for example) thal are communicated over the Internet and are thereby
vulnerable to e-Fraud (e.g. modification, editing, counterfeiting etc.).

Existing system

= We have several encryption systems in which the information to be
transmitted is encrypted using an algorithm with an appropriate key.

= In this , the information to be transmitted (plain text) is converted into
encrypted information(cipher text).

Problems in Existing System

= The weaknesses of all encryption systems is that the form of the output data (the
cipher text), if intercepted. alerts the intruder to the fact that the information being
transmitted may have some importance and that it is therefore worth attacking and
attempting to decrypt it.

= This aspect of cipher text transmission can be used to propagate disinformation,
achieved by encrypting information that is specifically designed to be intercepted
and decrypted.

= In this case, we assume that the intercept will be attacked, decrypted and the
information retrieved.

= There is no security when transmitting the data from one end to another.

Proposed System

Advantages of Proposed System

= Hides the encrypted message or a secret data in to an image .

= If there are any perceivable changes ‚there may be a chance for an
unauthorized person to modify the data.So, the data encryption into an

image and decryption and steganography is used to protect the data from
unauthorized person.

= The scheme allows for the self authentication of documents such as
letters, certificates and other image based data.

System Requirements

| HARDWARE REQUIREMENTS

System : Pentium Iv 2.4 GHz.
Hard Disk : 40 GB.

Floppy Drive : 1.44 Mb.
Monitor : 15 VGA Colour.
Mouse : Logitech.

Ram: 512 Mb.

SOFTWARE REQUIREMENTS

Operating system : - Windows XP.
Coding Language : JAVA

Modules

= File Upload And Encryption

Hiding Text

Text Extraction

= Decryption

File Upload And Encryption

= Admin upload the files using filename and field. The user will search the uploaded
files and select file and send request to admin.

= The key will encrypt using an encryption algorithm. Use the encryption function to
encrypt the numeric plaintext values using the public key.

Hiding Text

= Steganography is the process of hiding the one information in to other sources of
information like text, image or audio file so that it is not visible to the natural view.
Here, the image is encrypted, then encrypted information hidden in a host image It
is a simple approach to embedding a message in to the image.

Text Extraction:

= The stegoimage can view using the image upload path. The hidden text is
extracted from the host image using a stego key. The stego key is used to extract
the text from the image. The stego key finds the text hidden in image file. Extract
the text from an image; finally get the secret data and the hidden message stored
in a file.

Decryption:

= The encrypted information extract from an image and using a private key to
decrypt the hidden message. Break the cipher text into small blocks of data that
are the same length as the public key modulus. The blocks of data containing a
hexadecimal string. The interpret each hexadecimal string as a decimal integer
value. Use the decryption function to decrypt the integer values using the private
kay.

Output Screens

= Home Page

e-Fraud Prevention Based On The Self-Authentication
maun Of e-Documents

| Steganography

= Registration Page

e-Fraud Prevention Based On The Self-Authentication
FRAUD Of e-Documents

Registration

en

= Login Page

e-Fraud Prevention Based On The Self-Authentication

raus Of e-Documents

= Admin Page

e-Fraud Prevention Based On The Self-Authentication
Of e-Documents

= User Login

e-Fraud Prevention Based On The Self-Authentication
enaus Of e-Dacuments

+ Ah earch hun Pen
+ Let View Magenta

Conclusion

Security is an important issue while transferring the data using internet via E-
mail because any unauthorized person can hack the data. The proposed
approach provides higher security to protect the data.

THANK YOU