At TECHNOFIST, we provide academic projects based on Web security with the latest IEEE papers implementation. Below mentioned are the 2018 list and abstracts on the Web security domain. For synopsis and IEEE papers, please visit our head office and get registered.
OUR COMPANY VALUES
Instead of Quality, commitment, and success.
OUR CUSTOMERS
Our customers are delighted with the business benefits of the Technofist software solutions.
IEEE 2018-2019 WEB SECURITY BASED PROJECTS
- Latest 2018-2019 IEEE papers on Web Security concepts implementation projects and papers are accessible for final year computer science engineering and information science engineering students to choose from. 2018-2019 IEEE papers on Web Security with enhancement are obtainable for M-Tech final year students. CSE and ISE students from all over INDIA visit our branches in Bangalore to take out final year engineering projects on the Web Security domain. In Bangalore, more than five branches are available.
++IEEE 2018-2019 Web security projects for BE/B/Tech/M.Tech students++
Project Code | Description |
---|---|
TEWO01 | ONE-TIME PASSWORD FOR BIOMETRIC SYSTEMS: DISPOSABLE FEATURE TEMPLATES – Biometric access control systems are becoming more commonplace in society. However, these systems are susceptible to replay attacks. During a replay attack, an attacker can capture packets of data that represents an individual’s biometric. The attacker can then replay the data and gain unauthorized access into the system. Traditional password-based systems have the ability to use a one-time password scheme. This allows for a unique password to authenticate an individual, and it is then disposed. Any captured password will not be effective. Traditional biometric systems use a single feature extraction method to represent an individual, making captured data harder to change than a password. Contact: +91-9008001602 080-40969981 |
TEW002 | ENHANCED PASSWORD PROCESSING SCHEME BASED ON VISUAL CRYPTOGRAPHY AND OCR – Traditional password conversion scheme for user authentication is to transform the passwords into hash values. These hash-based password schemes are comparatively simple and fast because those are based on text and famed cryptography. However, those can be exposed to cyber-attacks utilizing password cracking tools or hash-cracking online sites. Attackers can figure out an original password from the hash value when that is relatively simple and plain. As a result, many hacking accidents have predominantly happened in systems adopting those hash-based schemes. We suggest an enhanced password processing scheme based on images using visual cryptography. Contact: +91-9008001602 080-40969981 |
TEWO03 | FULLY INCREMENTING VISUAL CRYPTOGRAPHY FROM A SUCCINCT NON-MONOTONIC STRUCTURE – Visual cryptography is a variant form of secret sharing. In general threshold setting, the k-out-of-n VC allows that, in a set of n participants, any k can recover and reconstruct the secret by stacking their shares. RIVC defines s layers and takes s secrets and then embeds each secret into each layer. The layers are defined by the number of participants. Contact: +91-9008001602 080-40969981 |
TEWO04 | ILLUSIONPIN: SHOULDER-SURFING RESISTANT AUTHENTICATION USING HYBRID IMAGES – We address the problem of shoulder-surfing attacks on authentication schemes by proposing IllusionPIN (IPIN), a PIN-based authentication method that operates on touchscreen devices. IPIN uses the technique of hybrid images to blend two keypads with different digit orderings. The user’s keypad is shuffled in every authentication attempt since the attacker may memorize the spatial arrangement of the pressed digits. Contact: +91-9008001602 080-40969981 |
TEW005 | REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING INTERPOLATION-BASED DISTRIBUTED SPACE RESERVATION – Reversible data hiding (RDH) in encrypted images has gained attention recently. Privacy protection of additional data as well as cover media makes it attractive for applications in medical imaging, cloud storage, forensics, etc. We propose a method for reversible data hiding in encrypted images (RDH-EI). After encrypting the image, those LSB planes are used to hide additional data. Contact: +91-9008001602 080-40969981 |
TEW006 | PASSNEIGHBOR: A SHOULDER SURFING RESISTANT SCHEME – This project addresses shoulder-surfing attacks by proposing an authentication method that operates on touchscreen devices. Users see one keypad while attackers see another, attempting to thwart memorization attempts. Contact: +91-9008001602 080-40969981 |
TEWO04 | STAMP: ENABLING PRIVACY-PRESERVING LOCATION PROOFS FOR MOBILE USERS – STAMP ensures the integrity and non-transferability of location proofs and protects users’ privacy using a semi-trusted Certification Authority. Contact: +91-9008001602 080-40969981 |
TEW005 | FRAPPE: DETECTING MALICIOUS FACEBOOK APPLICATIONS – Communication technology has evolved, leading to an increase in privacy and security concerns on online social networks. Contact: +91-9008001602 080-40969981 |
CONTACT US
For IEEE paper and full ABSTRACT
+91 9008001602
Technofist provides the latest IEEE 2018 — 2019 Web security Projects for final year engineering students in Bangalore, India. Web security Based Projects with the latest concepts are available for final year ECE, EEE, CSE, ISE, and telecom students.
ABOUT WEB SECURITY
Web security, also known as cyber security or IT security, protects computer systems from theft or damage to their hardware, software, or information, as well as from disruption or misdirection of the services they provide.
Cyber security includes controlling physical access to the hardware and protecting against harm that may come via network access, data and code injection. The field is of growing importance due to the increasing reliance on computer systems and the Internet.
Tools & Techniques Used in Cyber Security
- Authentication: Verifies a user’s identity based on credentials.
- Encryption: Renders data undecipherable without a key.
- Digital signatures: Verify the authenticity of digital messages.
- Anti-virus: Prevents and scans for viruses.
- Firewall: Prevents unauthorized access to computers.
Types of Web Security
- Internet and Network Security
- Standalone Computer Security
- Data Loss by Accidents
Phishing
Phishing tactics are used by attackers to trick users into divulging sensitive information by pretending to be a trusted source.
Applications of Web Security Projects
- Online banking
- Mail services
- Smart health system
- Social networks
- Automatic heating & cooling system
- Network security
- Electronic marketplaces