SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1830
PROTECTING FACEBOOK ACCOUNT FROM MALICIOUS ATTACKING
APPLICATIONS
Sandhya Dayalan[1], M.S.Vinmathi[2]
[1]Student of Computer Science and Engineering Department, Panimalar Engineering College, Tamil Nadu, India
[2]Associate Professor of Computer Science and Engineering Department, Panimalar Engineering College, Tamil
Nadu, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract –This paper introduces a novel rank-
based strategy for picture watermarking. In the
watermark implanting process, the host picture is
separated into pieces, trailed by 2-D discrete
cosine change (DCT). For each picture obstruct, a
mystery key is utilized to arbitrarily choose an
arrangement of DCT coefficients appropriate for
watermark inserting. Watermark bits are
embedded into a picture hinder by changing the
arrangement of DCT coefficients utilizing a rank-
based installing standard. In the watermark
discovery prepare, the comparing recognition
lattices are shaped from the obtained picture
utilizing the Secret key. A short time later, the
watermark bits are removed by checking the
positions of the discovery frameworks. Since the
proposed watermarking strategy just uses two
DCT coefficients to conceal one watermark bit, it
can accomplish high installing limit. In addition,
our strategy is free of host flag impedance. This
coveted element and the use of a blunder cushion
in watermark installing results in high power
against assaults. Hypothetical examination and
test comes about showing the adequacy of the
proposed technique.
Key Words: Secret Key, Computerized watermarking ,
Encryption and Decryption.
1. Introduction.
Networking is one of the most interesting concepts of
study in the field of computer science today. Computer
Networking may be seen as a branch of electrical building,
media interchanges, programming designing, information
development or PC outlining.
A Computer network empowers interpersonal
correspondences allowing customers to pass on capably
and adequately through various means: email, messaging,
visit rooms, telephone, video telephone calls, and video
conferencing. Offering access to information on shared
stockpiling contraptions is a key part of numerous
Networks. A PC Network or data Network is a media
correspondences mastermind which grants center points
to share resources.
Eg. The Internet!
Today facebook is one of the most popular social
networking sites to share photos and text messages with
our friends family members. But there are many chances
of the data (photos, texts) getting hacked while we share it
in facebook. Hackers are people who try to break into PC
frameworks for any illicit reason or people who
malevolently break into frameworks for personal gain .
1.1 Related Work.
Detecting Spam on OSNs: Gao et al. [11] analyzed posts on
the walls of 3.5 million Facebook users and showed that
10% of links posted on Facebook walls are spam. They
also presented techniques to identify compromised
accounts and spam campaigns. In other work, Gao et al.
[12] and Rahman et al. [10] develop efficient techniques
for online spam filtering on OSNs such as Facebook. While
Gao et al. [12] rely on having the whole social graph as
input, and so is usable only by the OSN provider, Rahman
et al. [10] develop a third-party application for spam
detection on Facebook.
In contrast to all of these efforts, rather than classifying
individual posts as spam, we focus on giving protection to
our account as well as the photos or text messages we
send and also detect the malicious hackers who try to hack
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1831
the data that we send and notify them to the
administrator.
1.2 Need for The Project.
The hacking process is done by script kiddies as well as
criminal hackers.
The graph indicates that the hacking process has
drastically increased over the years
The crackers hack the photos and misuse them in many
ways. These hackers tread into the privacy of celebrities
and individuals and also tend to manipulate the
information about them and also hack the photos that
they share. They publicize this tampered information and
photos thereby harming the reputation of the celebrities
and individuals. In order to ensure that the data that we
send securely reaches the destination avoiding data
breach and also from getting hacked we provide
protection to our account by implementing techniques like
watermarking and making use of encryption and
decryption techniques adopted from PBE
algorithm[Password Based Encryption] that would help
the users to safely share their photos or messages among
their friends selectively .It not only gives protection but
also detects the Crackers who try to decrypt the images or
text by entering the wrong secret key and notifies them to
the administrator.
2. Existing System.
With the quick development of correspondence systems
and advances in sight and sound preparing innovations,
mixed media robbery has turned into a difficult issue. In
an open system condition, computerized watermarking is
a promising innovation to handle media information
robbery. In computerized watermarking, the watermark
information, (for example, distributer data, client
character, document exchange/downloading records, and
so on.) are covered up into the genuine sight and sound
question without influencing its typical use. Whenever
essential, the proprietors or law authorization
organizations can separate the watermark information, by
utilizing a mystery key, to follow the wellspring of illicit
dissemination. While computerized watermarking can be
connected to different mixed media information, for
example, sound, picture and video, this paper concentrates
on picture watermarking. With regards to picture
watermarking, intangibility, strength, installing limit and
security are of essential concerns. Up until now, different
picture watermarking plans have been accounted for in
the writing and a hefty portion of them were based upon
systems identified with histogram minute spatial element
areas spread range (SS) and quantization. In numerous
applications, for example, secretive correspondence, high
installing limit is craved, while heartiness against
geometric assaults is not for the most part concerned.
Contrasted with the watermarking techniques in, the
strategies in light of SS and quantization can ordinarily
accomplish higher inserting limit under given
impalpability and strength.
Drawbacks Of The Existing System.
 Does not give proficiency in Secret
message sharing by means of picture
watermarking.
 Less security.
 The existing framework gives less adaptability.
3. Proposed system.
In this paper, we show a novel rank-based picture
watermarking strategy to essentially increment
implanting limit while keeping up palatable intangibility
and power against normal assaults. In the proposed
technique, the 2-D discrete cosine change (DCT) is
connected to each picture square to acquire the relating
DCT coefficients. A mystery key is used to haphazardly
pick an arrangement of DCT coefficients appropriate for
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1832
inserting watermarks. The installing of watermark bits is
completed by changing the arrangement of DCT
coefficients utilizing a rank-based implanting principle,
where a mistake cushion is additionally used to manage
the blunders brought on by assaults. At the watermark
identification end, we register the DCT coefficients from
the got picture and afterward build the recognition
frameworks utilizing a similar mystery key. The inserted
watermark bits can be removed by checking the positions
of the location frameworks. Contrasted and the current
picture watermarking techniques, the proposed strategy
has substantially higher inserting limit. In the meantime, it
has high perceptual quality and is strong against normal
assaults. The unrivalled execution of our technique is
broke down in principle and showed by reproduction
results. We use to encrypt the mystery message through
Password Based Encryption calculation to secure the
clients mystery messages. We add that encoded message
to the watermark of every last split pictures.
Advantages of The Proposed System.
 It gives proficiency in Secret message sharing by
means of picture watermarking.
 High security.
 More Flexible to share the watermark encode
pictures one to many shares.
4 . Modules Description.
Fig 1. Architecture.
4.1 Users.
Users will register the details and log in the page, Send
friend request to other users. Accept friend request. Add
the images and Split the image in to four parts . Add a
Secret message to the split images and convert watermark
for the secret message and share in to the friends with
random unique secret key via email. Received images are
view by using secret random key to decrypt the secret
message on out application.
4.2 Computerized watermarking
Computerized watermarking is the demonstration of
concealing a message identified with an advanced flag (i.e.
a picture, tune, video) inside the flag itself. It is an idea
firmly identified with steganography, in that they both
shroud a message inside an advanced flag. Be that as it
may, what isolates them is their objective. Watermarking
tries to shroud a message identified with the genuine
substance of the computerized flag, while in
steganography the advanced flag has no connection to the
message, and it is simply utilized as a cover to conceal its
reality. Watermarking has been around for a few
centuries, as watermarks discovered at first in plain paper
and along these lines in paper bills. Notwithstanding, the
field of advanced watermarking was just created amid the
most recent 15 years and it is currently being utilized for a
wide range of utilizations.
Watermark- - an undetectable mark installed inside a
picture to show validness or verification of ownership. It
Discourages unapproved replicating and circulation of
pictures over the web. It assures that an advanced picture
has not been adjusted. Programming can be utilized to
scan for a particular watermark. Watermark ought to
seem irregular, commotion like grouping Appear
Undetectable Good Correlation Properties. High
connection with signs like watermark. Low connection
with different watermarks or irregular commotion
Common successions A) Normal dispersion B) m-
groupings Watermark put into data substance of Original
Image to make Watermarked Image Content Spatial
Domain (Least Significant Bit) FFT - Magnitude and Phase
Wavelet Transforms DCT Coefficients.
4.3 Encrypt /Decrypt.
Password based encryption (PBE) was intended to take
care of issues of the kind portrayed previously. A PBE
calculation creates a mystery key in light of a secret key,
which will be given by the end client. As of now there are
two benchmarks (PKCS #5 and #12) that characterize how
a watchword can be utilized to produce a symmetric key.
A decent PBE calculation will likewise blend in an
irregular number called the salt alongside the watchword
to make the key. Without a salt, the programmer can play
out an animal drive look for the key-space no sweat. PBE is
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1833
normally utilized as a part of frameworks, for example,
nearby document encryption devices, which are utilized to
guarantee information secrecy. They are additionally
utilized as a system to secure the client's private key store,
(for example, the PKCS #8 based assurance of private
keys). Client provoked passwords are normally either a
subset of ASCII or UTF-8 for purposes on between
operability. It ought to be noticed that UTF-8 is a super
arrangement of ASCII.
The salt is an esteem that can foil word reference assaults
or pre-calculation assaults. An assailant can without much
of a stretch pre-figure the condensations of thousands of
conceivable passwords and make a "word reference" of
likely keys. Review the way that when you play out the
process, changing info information even a little changes
the subsequent process. By processing the secret word
with a salt, the aggressor's lexicon is rendered pointless.
The aggressor should look through passwords for each
estimation of the salt. On the other hand, the aggressor
needs to hold up until a watchword operation is
performed and the salt utilized as a part of that specific
operation is caught. Since the salt is arbitrary in nature, it
is exceptionally impossible that a similar salt will be
utilized for the following encryption handle therefore
restricting the assailant assist. The salt should be created
utilizing a pseudo irregular number generator (PRNG). It
is additionally firmly prescribed not to reuse a similar salt
an incentive for various occasions of encryption. Take note
of that the salt is not a mystery esteem. In this way, it can
be transmitted alongside the figure content to the collector
or by means of out-of-band transmission strategies. In a
perfect world the length of the salt ought to be same as the
yield of the hash capacity being utilized.
4.4 Administrator.
Admin will maintain the all user details and the image
attacker details on our application.
Admin maintains proper user details and track the
attackers via session tracking.
4.5 Session Tracking.
All the users are tracked by session tracking. Suppose
users enter the miss matched key on received images page
that user will mark as an attacker on our application and
sends all the proper details regarding the attacker to the
administrator on our application.
Fig 2. Depicts hackers trying to hack the data by entering
the wrong secret key.
Conclusion.
The proposed technique not only detects the hackers who
try to illegally hack the data that is being sent but also
prevents the hackers from hacking the data by giving
strong protection to the data so that they reach the
correct destination .
We trust that facebook will profit by our proposals to
prevent the hazard of crackers.
In future, it is possible to process all the watermarks in to
videos and add the watermarks in each and every frame to
enhance the security to encrypt the secret message and
send to the end users globally.
REFERENCES
[1] C. Pring, “100 social media statistics for 2012,” 2012
[Online]. Available: http://thesocialskinny.com/100-
social-media-statistics-for-2012/
[2] Facebook, Palo Alto, CA, USA, “Facebook Opengraph
API,” [Online]. Available:
http://developers.facebook.com/docs/reference/api/
[3] “Wiki: Facebook platform,” 2014 [Online]. Available:
http://en. wikipedia.org/wiki/Facebook_Platform
[4] “Pr0file stalker: Rogue Facebook application,” 2012
[Online]. Available:
https://apps.facebook.com/mypagekeeper/?status=scam_
report- _fb_survey_scam_pr0file_viewer_2012_4_4
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1834
[5] “Which cartoon character are you—Facebook survey
scam,” 2012 [Online]. Available:
https://apps.facebook.com/
mypagekeeper/?status=scam_report_fb_survey_scam_whii
ch_ cartoon_character_are_you_2012_03_30
[6] G. Cluley, “The Pink Facebook rogue application and
survey scam,” 2012 [Online]. Available:
http://nakedsecurity.sophos.com/2012/02/ 27/pink-
facebook-survey-scam/
[7] D. Goldman, “Facebook tops 900 million users,” 2012
[Online]. Available:
http://money.cnn.com/2012/04/23/technology/faceboo
kq1/index.htm
[8] R. Naraine, “Hackers selling $25 toolkit to create
malicious Facebook apps,” 2011 [Online]. Available:
http://zd.net/g28HxI
[9] HackTrix, “Stay away from malicious Facebook apps,”
2013 [Online]. Available: http://bit.ly/b6gWn5 [10] M. S.
Rahman, T.-K. Huang, H. V. Madhyastha, and M. Faloutsos,
“Efficient and scalable socware detection in online social
networks,” in Proc. USENIX Security, 2012, p. 32.
[11] H. Gao et al., “Detecting and characterizing social
spam campaigns,” in Proc. IMC, 2010, pp. 35–47.
[12] H. Gao, Y. Chen, K. Lee, D. Palsetia, and A. Choudhary,
“Towards online spam filtering in social networks,” in
Proc. NDSS, 2012.
[13] P. Chia, Y. Yamamoto, and N. Asokan, “Is this app
safe? A large scale study on application permissions and
risk signals,” in Proc. WWW, 2012, pp. 311–320.
[14] “WhatApp? (beta)—A Stanford Center for Internet
and Society Website with support from the Rose
Foundation,” [Online]. Available:
https://whatapp.org/facebook/

Weitere ähnliche Inhalte

Was ist angesagt?

Securing Cloud from Cloud Drain
Securing Cloud from Cloud DrainSecuring Cloud from Cloud Drain
Securing Cloud from Cloud DrainEswar Publications
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...IRJET Journal
 
Do s and d dos attacks at osi layers
Do s and d dos attacks at osi layersDo s and d dos attacks at osi layers
Do s and d dos attacks at osi layersHadeel Sadiq Obaid
 
Messaging Gateway
Messaging GatewayMessaging Gateway
Messaging Gatewayijsrd.com
 
Hindering data theft attack through fog computing
Hindering data theft attack through fog computingHindering data theft attack through fog computing
Hindering data theft attack through fog computingeSAT Publishing House
 
76 s201913
76 s20191376 s201913
76 s201913IJRAT
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniqueseSAT Journals
 
A survey on cloud security issues and techniques
A survey on cloud security issues and techniquesA survey on cloud security issues and techniques
A survey on cloud security issues and techniquesijcsa
 
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...Editor IJMTER
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd Iaetsd
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
WLAN Penetration Examination of The University of Pembangunan Panca Budi
WLAN Penetration Examination of The University of Pembangunan Panca BudiWLAN Penetration Examination of The University of Pembangunan Panca Budi
WLAN Penetration Examination of The University of Pembangunan Panca BudiUniversitas Pembangunan Panca Budi
 
IRJET- Hashxplorer-A Distributed System for Hash Matching
IRJET- Hashxplorer-A Distributed System for Hash MatchingIRJET- Hashxplorer-A Distributed System for Hash Matching
IRJET- Hashxplorer-A Distributed System for Hash MatchingIRJET Journal
 
IRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
IRJET- Medical Big Data Protection using Fog Computing and Decoy TechniqueIRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
IRJET- Medical Big Data Protection using Fog Computing and Decoy TechniqueIRJET Journal
 
A Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
A Multi-Level Security for Preventing DDOS Attacks in Cloud EnvironmentsA Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
A Multi-Level Security for Preventing DDOS Attacks in Cloud Environmentsmlaij
 
Web 2.0
Web 2.0Web 2.0
Web 2.0gypsy
 
Privacy Recommendations and Ranking of User Images on Content Sharing Sites
Privacy Recommendations and Ranking of User Images on Content Sharing SitesPrivacy Recommendations and Ranking of User Images on Content Sharing Sites
Privacy Recommendations and Ranking of User Images on Content Sharing SitesIRJET Journal
 

Was ist angesagt? (20)

Securing Cloud from Cloud Drain
Securing Cloud from Cloud DrainSecuring Cloud from Cloud Drain
Securing Cloud from Cloud Drain
 
2 21916 wp_asert_en
2 21916 wp_asert_en2 21916 wp_asert_en
2 21916 wp_asert_en
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
 
Do s and d dos attacks at osi layers
Do s and d dos attacks at osi layersDo s and d dos attacks at osi layers
Do s and d dos attacks at osi layers
 
Resin on Rails
Resin on RailsResin on Rails
Resin on Rails
 
Messaging Gateway
Messaging GatewayMessaging Gateway
Messaging Gateway
 
Hindering data theft attack through fog computing
Hindering data theft attack through fog computingHindering data theft attack through fog computing
Hindering data theft attack through fog computing
 
76 s201913
76 s20191376 s201913
76 s201913
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniques
 
Survey mobile app
Survey mobile appSurvey mobile app
Survey mobile app
 
A survey on cloud security issues and techniques
A survey on cloud security issues and techniquesA survey on cloud security issues and techniques
A survey on cloud security issues and techniques
 
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challenges
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
WLAN Penetration Examination of The University of Pembangunan Panca Budi
WLAN Penetration Examination of The University of Pembangunan Panca BudiWLAN Penetration Examination of The University of Pembangunan Panca Budi
WLAN Penetration Examination of The University of Pembangunan Panca Budi
 
IRJET- Hashxplorer-A Distributed System for Hash Matching
IRJET- Hashxplorer-A Distributed System for Hash MatchingIRJET- Hashxplorer-A Distributed System for Hash Matching
IRJET- Hashxplorer-A Distributed System for Hash Matching
 
IRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
IRJET- Medical Big Data Protection using Fog Computing and Decoy TechniqueIRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
IRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
 
A Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
A Multi-Level Security for Preventing DDOS Attacks in Cloud EnvironmentsA Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
A Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
 
Web 2.0
Web 2.0Web 2.0
Web 2.0
 
Privacy Recommendations and Ranking of User Images on Content Sharing Sites
Privacy Recommendations and Ranking of User Images on Content Sharing SitesPrivacy Recommendations and Ranking of User Images on Content Sharing Sites
Privacy Recommendations and Ranking of User Images on Content Sharing Sites
 

Ähnlich wie Protecting Facebook Account From Malicious Attacking Applications

Defending Man In The Middle Attacks
Defending Man In The Middle AttacksDefending Man In The Middle Attacks
Defending Man In The Middle AttacksIRJET Journal
 
Break Loose Acting To Forestall Emulation Blast
Break Loose Acting To Forestall Emulation BlastBreak Loose Acting To Forestall Emulation Blast
Break Loose Acting To Forestall Emulation BlastIRJET Journal
 
IRJET- Security from Threats of Computer System
IRJET-  	  Security from Threats of Computer SystemIRJET-  	  Security from Threats of Computer System
IRJET- Security from Threats of Computer SystemIRJET Journal
 
Advance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsAdvance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsIRJET Journal
 
IRJET- Comparative Study on Video Steganography in Spatial and IWT Domain
IRJET-  	  Comparative Study on Video Steganography in Spatial and IWT DomainIRJET-  	  Comparative Study on Video Steganography in Spatial and IWT Domain
IRJET- Comparative Study on Video Steganography in Spatial and IWT DomainIRJET Journal
 
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...IRJET Journal
 
An Anti-Phishing Framework Based on Visual Cryptography
An Anti-Phishing Framework Based on Visual CryptographyAn Anti-Phishing Framework Based on Visual Cryptography
An Anti-Phishing Framework Based on Visual CryptographyIRJET Journal
 
IRJET- Data Deduplication Security with Dynamic Ownership Management
IRJET- Data Deduplication Security with Dynamic Ownership ManagementIRJET- Data Deduplication Security with Dynamic Ownership Management
IRJET- Data Deduplication Security with Dynamic Ownership ManagementIRJET Journal
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET Journal
 
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...IRJET Journal
 
IRJET- A Data Sharing Protocol to Minimize Security and Privacy Risks in Clou...
IRJET- A Data Sharing Protocol to Minimize Security and Privacy Risks in Clou...IRJET- A Data Sharing Protocol to Minimize Security and Privacy Risks in Clou...
IRJET- A Data Sharing Protocol to Minimize Security and Privacy Risks in Clou...IRJET Journal
 
IRJET- A Survey on Cloud Data Security Methods and Future Directions
IRJET- A Survey on Cloud Data Security Methods and Future DirectionsIRJET- A Survey on Cloud Data Security Methods and Future Directions
IRJET- A Survey on Cloud Data Security Methods and Future DirectionsIRJET Journal
 
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack DetectionIRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack DetectionIRJET Journal
 
IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerp...
IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerp...IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerp...
IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerp...IRJET Journal
 
Paper id 312201518
Paper id 312201518Paper id 312201518
Paper id 312201518IJRAT
 
IRJET- A Survey Paper on Secured Email Server Using 3DES
IRJET- A Survey Paper on Secured Email Server Using 3DESIRJET- A Survey Paper on Secured Email Server Using 3DES
IRJET- A Survey Paper on Secured Email Server Using 3DESIRJET Journal
 
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud ComputingIRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud ComputingIRJET Journal
 
IRJET- A Survey on DDOS Attack in Manet
IRJET-  	  A Survey on DDOS Attack in ManetIRJET-  	  A Survey on DDOS Attack in Manet
IRJET- A Survey on DDOS Attack in ManetIRJET Journal
 
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET -  	  Security Model for Preserving the Privacy of Medical Big Data in ...IRJET -  	  Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...IRJET Journal
 

Ähnlich wie Protecting Facebook Account From Malicious Attacking Applications (20)

Defending Man In The Middle Attacks
Defending Man In The Middle AttacksDefending Man In The Middle Attacks
Defending Man In The Middle Attacks
 
Break Loose Acting To Forestall Emulation Blast
Break Loose Acting To Forestall Emulation BlastBreak Loose Acting To Forestall Emulation Blast
Break Loose Acting To Forestall Emulation Blast
 
IRJET- Security from Threats of Computer System
IRJET-  	  Security from Threats of Computer SystemIRJET-  	  Security from Threats of Computer System
IRJET- Security from Threats of Computer System
 
Advance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsAdvance security in cloud computing for military weapons
Advance security in cloud computing for military weapons
 
IRJET- Comparative Study on Video Steganography in Spatial and IWT Domain
IRJET-  	  Comparative Study on Video Steganography in Spatial and IWT DomainIRJET-  	  Comparative Study on Video Steganography in Spatial and IWT Domain
IRJET- Comparative Study on Video Steganography in Spatial and IWT Domain
 
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
 
An Anti-Phishing Framework Based on Visual Cryptography
An Anti-Phishing Framework Based on Visual CryptographyAn Anti-Phishing Framework Based on Visual Cryptography
An Anti-Phishing Framework Based on Visual Cryptography
 
IRJET- Data Deduplication Security with Dynamic Ownership Management
IRJET- Data Deduplication Security with Dynamic Ownership ManagementIRJET- Data Deduplication Security with Dynamic Ownership Management
IRJET- Data Deduplication Security with Dynamic Ownership Management
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
 
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...
 
Fake News Analyzer
Fake News AnalyzerFake News Analyzer
Fake News Analyzer
 
IRJET- A Data Sharing Protocol to Minimize Security and Privacy Risks in Clou...
IRJET- A Data Sharing Protocol to Minimize Security and Privacy Risks in Clou...IRJET- A Data Sharing Protocol to Minimize Security and Privacy Risks in Clou...
IRJET- A Data Sharing Protocol to Minimize Security and Privacy Risks in Clou...
 
IRJET- A Survey on Cloud Data Security Methods and Future Directions
IRJET- A Survey on Cloud Data Security Methods and Future DirectionsIRJET- A Survey on Cloud Data Security Methods and Future Directions
IRJET- A Survey on Cloud Data Security Methods and Future Directions
 
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack DetectionIRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
 
IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerp...
IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerp...IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerp...
IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerp...
 
Paper id 312201518
Paper id 312201518Paper id 312201518
Paper id 312201518
 
IRJET- A Survey Paper on Secured Email Server Using 3DES
IRJET- A Survey Paper on Secured Email Server Using 3DESIRJET- A Survey Paper on Secured Email Server Using 3DES
IRJET- A Survey Paper on Secured Email Server Using 3DES
 
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud ComputingIRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
 
IRJET- A Survey on DDOS Attack in Manet
IRJET-  	  A Survey on DDOS Attack in ManetIRJET-  	  A Survey on DDOS Attack in Manet
IRJET- A Survey on DDOS Attack in Manet
 
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET -  	  Security Model for Preserving the Privacy of Medical Big Data in ...IRJET -  	  Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
 

Mehr von IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

Mehr von IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Kürzlich hochgeladen

Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitterShivangiSharma879191
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Solving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptSolving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptJasonTagapanGulla
 
Vishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsVishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsSachinPawar510423
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 

Kürzlich hochgeladen (20)

Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Solving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptSolving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.ppt
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Vishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsVishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documents
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 

Protecting Facebook Account From Malicious Attacking Applications

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1830 PROTECTING FACEBOOK ACCOUNT FROM MALICIOUS ATTACKING APPLICATIONS Sandhya Dayalan[1], M.S.Vinmathi[2] [1]Student of Computer Science and Engineering Department, Panimalar Engineering College, Tamil Nadu, India [2]Associate Professor of Computer Science and Engineering Department, Panimalar Engineering College, Tamil Nadu, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract –This paper introduces a novel rank- based strategy for picture watermarking. In the watermark implanting process, the host picture is separated into pieces, trailed by 2-D discrete cosine change (DCT). For each picture obstruct, a mystery key is utilized to arbitrarily choose an arrangement of DCT coefficients appropriate for watermark inserting. Watermark bits are embedded into a picture hinder by changing the arrangement of DCT coefficients utilizing a rank- based installing standard. In the watermark discovery prepare, the comparing recognition lattices are shaped from the obtained picture utilizing the Secret key. A short time later, the watermark bits are removed by checking the positions of the discovery frameworks. Since the proposed watermarking strategy just uses two DCT coefficients to conceal one watermark bit, it can accomplish high installing limit. In addition, our strategy is free of host flag impedance. This coveted element and the use of a blunder cushion in watermark installing results in high power against assaults. Hypothetical examination and test comes about showing the adequacy of the proposed technique. Key Words: Secret Key, Computerized watermarking , Encryption and Decryption. 1. Introduction. Networking is one of the most interesting concepts of study in the field of computer science today. Computer Networking may be seen as a branch of electrical building, media interchanges, programming designing, information development or PC outlining. A Computer network empowers interpersonal correspondences allowing customers to pass on capably and adequately through various means: email, messaging, visit rooms, telephone, video telephone calls, and video conferencing. Offering access to information on shared stockpiling contraptions is a key part of numerous Networks. A PC Network or data Network is a media correspondences mastermind which grants center points to share resources. Eg. The Internet! Today facebook is one of the most popular social networking sites to share photos and text messages with our friends family members. But there are many chances of the data (photos, texts) getting hacked while we share it in facebook. Hackers are people who try to break into PC frameworks for any illicit reason or people who malevolently break into frameworks for personal gain . 1.1 Related Work. Detecting Spam on OSNs: Gao et al. [11] analyzed posts on the walls of 3.5 million Facebook users and showed that 10% of links posted on Facebook walls are spam. They also presented techniques to identify compromised accounts and spam campaigns. In other work, Gao et al. [12] and Rahman et al. [10] develop efficient techniques for online spam filtering on OSNs such as Facebook. While Gao et al. [12] rely on having the whole social graph as input, and so is usable only by the OSN provider, Rahman et al. [10] develop a third-party application for spam detection on Facebook. In contrast to all of these efforts, rather than classifying individual posts as spam, we focus on giving protection to our account as well as the photos or text messages we send and also detect the malicious hackers who try to hack
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1831 the data that we send and notify them to the administrator. 1.2 Need for The Project. The hacking process is done by script kiddies as well as criminal hackers. The graph indicates that the hacking process has drastically increased over the years The crackers hack the photos and misuse them in many ways. These hackers tread into the privacy of celebrities and individuals and also tend to manipulate the information about them and also hack the photos that they share. They publicize this tampered information and photos thereby harming the reputation of the celebrities and individuals. In order to ensure that the data that we send securely reaches the destination avoiding data breach and also from getting hacked we provide protection to our account by implementing techniques like watermarking and making use of encryption and decryption techniques adopted from PBE algorithm[Password Based Encryption] that would help the users to safely share their photos or messages among their friends selectively .It not only gives protection but also detects the Crackers who try to decrypt the images or text by entering the wrong secret key and notifies them to the administrator. 2. Existing System. With the quick development of correspondence systems and advances in sight and sound preparing innovations, mixed media robbery has turned into a difficult issue. In an open system condition, computerized watermarking is a promising innovation to handle media information robbery. In computerized watermarking, the watermark information, (for example, distributer data, client character, document exchange/downloading records, and so on.) are covered up into the genuine sight and sound question without influencing its typical use. Whenever essential, the proprietors or law authorization organizations can separate the watermark information, by utilizing a mystery key, to follow the wellspring of illicit dissemination. While computerized watermarking can be connected to different mixed media information, for example, sound, picture and video, this paper concentrates on picture watermarking. With regards to picture watermarking, intangibility, strength, installing limit and security are of essential concerns. Up until now, different picture watermarking plans have been accounted for in the writing and a hefty portion of them were based upon systems identified with histogram minute spatial element areas spread range (SS) and quantization. In numerous applications, for example, secretive correspondence, high installing limit is craved, while heartiness against geometric assaults is not for the most part concerned. Contrasted with the watermarking techniques in, the strategies in light of SS and quantization can ordinarily accomplish higher inserting limit under given impalpability and strength. Drawbacks Of The Existing System.  Does not give proficiency in Secret message sharing by means of picture watermarking.  Less security.  The existing framework gives less adaptability. 3. Proposed system. In this paper, we show a novel rank-based picture watermarking strategy to essentially increment implanting limit while keeping up palatable intangibility and power against normal assaults. In the proposed technique, the 2-D discrete cosine change (DCT) is connected to each picture square to acquire the relating DCT coefficients. A mystery key is used to haphazardly pick an arrangement of DCT coefficients appropriate for
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1832 inserting watermarks. The installing of watermark bits is completed by changing the arrangement of DCT coefficients utilizing a rank-based implanting principle, where a mistake cushion is additionally used to manage the blunders brought on by assaults. At the watermark identification end, we register the DCT coefficients from the got picture and afterward build the recognition frameworks utilizing a similar mystery key. The inserted watermark bits can be removed by checking the positions of the location frameworks. Contrasted and the current picture watermarking techniques, the proposed strategy has substantially higher inserting limit. In the meantime, it has high perceptual quality and is strong against normal assaults. The unrivalled execution of our technique is broke down in principle and showed by reproduction results. We use to encrypt the mystery message through Password Based Encryption calculation to secure the clients mystery messages. We add that encoded message to the watermark of every last split pictures. Advantages of The Proposed System.  It gives proficiency in Secret message sharing by means of picture watermarking.  High security.  More Flexible to share the watermark encode pictures one to many shares. 4 . Modules Description. Fig 1. Architecture. 4.1 Users. Users will register the details and log in the page, Send friend request to other users. Accept friend request. Add the images and Split the image in to four parts . Add a Secret message to the split images and convert watermark for the secret message and share in to the friends with random unique secret key via email. Received images are view by using secret random key to decrypt the secret message on out application. 4.2 Computerized watermarking Computerized watermarking is the demonstration of concealing a message identified with an advanced flag (i.e. a picture, tune, video) inside the flag itself. It is an idea firmly identified with steganography, in that they both shroud a message inside an advanced flag. Be that as it may, what isolates them is their objective. Watermarking tries to shroud a message identified with the genuine substance of the computerized flag, while in steganography the advanced flag has no connection to the message, and it is simply utilized as a cover to conceal its reality. Watermarking has been around for a few centuries, as watermarks discovered at first in plain paper and along these lines in paper bills. Notwithstanding, the field of advanced watermarking was just created amid the most recent 15 years and it is currently being utilized for a wide range of utilizations. Watermark- - an undetectable mark installed inside a picture to show validness or verification of ownership. It Discourages unapproved replicating and circulation of pictures over the web. It assures that an advanced picture has not been adjusted. Programming can be utilized to scan for a particular watermark. Watermark ought to seem irregular, commotion like grouping Appear Undetectable Good Correlation Properties. High connection with signs like watermark. Low connection with different watermarks or irregular commotion Common successions A) Normal dispersion B) m- groupings Watermark put into data substance of Original Image to make Watermarked Image Content Spatial Domain (Least Significant Bit) FFT - Magnitude and Phase Wavelet Transforms DCT Coefficients. 4.3 Encrypt /Decrypt. Password based encryption (PBE) was intended to take care of issues of the kind portrayed previously. A PBE calculation creates a mystery key in light of a secret key, which will be given by the end client. As of now there are two benchmarks (PKCS #5 and #12) that characterize how a watchword can be utilized to produce a symmetric key. A decent PBE calculation will likewise blend in an irregular number called the salt alongside the watchword to make the key. Without a salt, the programmer can play out an animal drive look for the key-space no sweat. PBE is
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1833 normally utilized as a part of frameworks, for example, nearby document encryption devices, which are utilized to guarantee information secrecy. They are additionally utilized as a system to secure the client's private key store, (for example, the PKCS #8 based assurance of private keys). Client provoked passwords are normally either a subset of ASCII or UTF-8 for purposes on between operability. It ought to be noticed that UTF-8 is a super arrangement of ASCII. The salt is an esteem that can foil word reference assaults or pre-calculation assaults. An assailant can without much of a stretch pre-figure the condensations of thousands of conceivable passwords and make a "word reference" of likely keys. Review the way that when you play out the process, changing info information even a little changes the subsequent process. By processing the secret word with a salt, the aggressor's lexicon is rendered pointless. The aggressor should look through passwords for each estimation of the salt. On the other hand, the aggressor needs to hold up until a watchword operation is performed and the salt utilized as a part of that specific operation is caught. Since the salt is arbitrary in nature, it is exceptionally impossible that a similar salt will be utilized for the following encryption handle therefore restricting the assailant assist. The salt should be created utilizing a pseudo irregular number generator (PRNG). It is additionally firmly prescribed not to reuse a similar salt an incentive for various occasions of encryption. Take note of that the salt is not a mystery esteem. In this way, it can be transmitted alongside the figure content to the collector or by means of out-of-band transmission strategies. In a perfect world the length of the salt ought to be same as the yield of the hash capacity being utilized. 4.4 Administrator. Admin will maintain the all user details and the image attacker details on our application. Admin maintains proper user details and track the attackers via session tracking. 4.5 Session Tracking. All the users are tracked by session tracking. Suppose users enter the miss matched key on received images page that user will mark as an attacker on our application and sends all the proper details regarding the attacker to the administrator on our application. Fig 2. Depicts hackers trying to hack the data by entering the wrong secret key. Conclusion. The proposed technique not only detects the hackers who try to illegally hack the data that is being sent but also prevents the hackers from hacking the data by giving strong protection to the data so that they reach the correct destination . We trust that facebook will profit by our proposals to prevent the hazard of crackers. In future, it is possible to process all the watermarks in to videos and add the watermarks in each and every frame to enhance the security to encrypt the secret message and send to the end users globally. REFERENCES [1] C. Pring, “100 social media statistics for 2012,” 2012 [Online]. Available: http://thesocialskinny.com/100- social-media-statistics-for-2012/ [2] Facebook, Palo Alto, CA, USA, “Facebook Opengraph API,” [Online]. Available: http://developers.facebook.com/docs/reference/api/ [3] “Wiki: Facebook platform,” 2014 [Online]. Available: http://en. wikipedia.org/wiki/Facebook_Platform [4] “Pr0file stalker: Rogue Facebook application,” 2012 [Online]. Available: https://apps.facebook.com/mypagekeeper/?status=scam_ report- _fb_survey_scam_pr0file_viewer_2012_4_4
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1834 [5] “Which cartoon character are you—Facebook survey scam,” 2012 [Online]. Available: https://apps.facebook.com/ mypagekeeper/?status=scam_report_fb_survey_scam_whii ch_ cartoon_character_are_you_2012_03_30 [6] G. Cluley, “The Pink Facebook rogue application and survey scam,” 2012 [Online]. Available: http://nakedsecurity.sophos.com/2012/02/ 27/pink- facebook-survey-scam/ [7] D. Goldman, “Facebook tops 900 million users,” 2012 [Online]. Available: http://money.cnn.com/2012/04/23/technology/faceboo kq1/index.htm [8] R. Naraine, “Hackers selling $25 toolkit to create malicious Facebook apps,” 2011 [Online]. Available: http://zd.net/g28HxI [9] HackTrix, “Stay away from malicious Facebook apps,” 2013 [Online]. Available: http://bit.ly/b6gWn5 [10] M. S. Rahman, T.-K. Huang, H. V. Madhyastha, and M. Faloutsos, “Efficient and scalable socware detection in online social networks,” in Proc. USENIX Security, 2012, p. 32. [11] H. Gao et al., “Detecting and characterizing social spam campaigns,” in Proc. IMC, 2010, pp. 35–47. [12] H. Gao, Y. Chen, K. Lee, D. Palsetia, and A. Choudhary, “Towards online spam filtering in social networks,” in Proc. NDSS, 2012. [13] P. Chia, Y. Yamamoto, and N. Asokan, “Is this app safe? A large scale study on application permissions and risk signals,” in Proc. WWW, 2012, pp. 311–320. [14] “WhatApp? (beta)—A Stanford Center for Internet and Society Website with support from the Rose Foundation,” [Online]. Available: https://whatapp.org/facebook/