Professional Documents
Culture Documents
Safe Keeping Evolution Pattern
Safe Keeping Evolution Pattern
Safe Keeping Evolution Pattern
PROJECT GUIDE
Mrs. G KOMALA. MD IMRAN (16D31A0510).
PROJECT COORDINATOR V RAJASHEKAR (16D35A0508).
Mr. T.BENERJI. L VAMSHI KRISHNA (16D31A0547).
INDEX
1. INTRODUCTION.
2. EXISTING SYSTEM.
3. PROPOSED SYSTEM.
4. SOFTWARE REQUIREMENTS.
5. SCREENSHOTS.
6. COCLUSION.
7. FUTURE ENHANCEMENT.
1. INTRODUCTION:
Pattern classification systems are commonly used in
adversarial applications, like biometric authentication,
network intrusion detection, and spam filtering, in which
data can be purposely manipulated by humans to
undermine their operation.
As this adversarial scenario is not taken into account by
classical design methods, pattern classification systems
may exhibit vulnerabilities, whose exploitation may
severely affect their performance, and consequently limit
their practical utility.
Extending pattern classification theory and design
methods to adversarial settings is thus a novel and very
relevant research direction, which has not yet been
pursued in a systematic way.
• Pattern classification systems may exhibit vulnerabilities, whose
exploitation may severely affect their performance, and consequently
limit their practical utility.
• In this paper, we address one of the main open issues: evaluating at
design phase the security of pattern classifiers, namely, the performance
degradation under potential attacks they may incur during operation.
• We propose a framework for empirical evaluation of classifier security
that formalizes and generalizes the main ideas proposed in the literature,
and give examples of its use in three real applications.
• Reported results show that security evaluation can provide a more
complete understanding of the classifier's behavior in adversarial
environments, and lead to better design choices.
0
2. EXISTING SYSTEM:
Pattern classification systems based on classical theory and design
methods do not take into account adversarial settings, they exhibit
vulnerabilities to several potential attacks, allowing adversaries to
undermine their effectiveness.
In particular, three main open issues can be identified:
Hardware - Pentium
Speed - 1.1 GHz
RAM - 1GB
Hard Disk - 20 GB
Floppy Drive - 1.44 MB
Key Board - Standard Windows
Mouse - Two or Three Button
Monitor - SVGA
5. SCREENSHOTS
After running this window is displayed
This is the home window
Here, Go to File and select the Embed Message
Here, Go to pictures folder
Here, Select the picture
Here, Enter the password min 8char and enter the text and
click on GO
Here, Message is displayed
After encryption, Go to file and select Retrieve
message
Here, Select the master file
Here, This window is displayed and click on GO
Here, Enter the Password and click on Retrieve now
Finally, The Message is displayed
6. CONCLUSION
In this paper we focused on empirical security evaluation
of pattern classifiers that have to be deployed in
adversarial environments, and proposed how to revise
the classical performance evaluation design step, which
is not suitable for this purpose.
Our main contribution is a framework for empirical
security evaluation that formalizes and generalizes ideas
from previous work, and can be applied to different
classifiers, learning algorithms, and classification tasks.
Our future work will be devoted to develop techniques
for simulating attacks for different applications.
7. FUTURE ENHANCEMENT
In the future this project offers user to enter the data
through simple and interactive forms
This is very helpful for the client to enter the desired
information through so much simplicity.
The user mainly more concerned about the validity of
the data, what ever he/she is entering.
There are checks on every stages of any new creation,
data entry or updating so that the user cannot enter the
invalid data which can create problem later.
THANK YOU….