This document proposes an encrypted image retrieval algorithm using discrete wavelet transform (DWT) and discrete cosine transform (DCT) to prevent fake profiles on social networks. The algorithm watermarks profile pictures during upload with user information to detect fake profiles. It aims to securely transmit images from users to cloud storage while preventing clone attacks. The technique uses DWT for data hiding in images, java static watermarking for image watermarking, and DCT for image compression.
This document proposes an encrypted image retrieval algorithm using discrete wavelet transform (DWT) and discrete cosine transform (DCT) to prevent fake profiles on social networks. The algorithm watermarks profile pictures during upload with user information to detect fake profiles. It aims to securely transmit images from users to cloud storage while preventing clone attacks. The technique uses DWT for data hiding in images, java static watermarking for image watermarking, and DCT for image compression.
This document proposes an encrypted image retrieval algorithm using discrete wavelet transform (DWT) and discrete cosine transform (DCT) to prevent fake profiles on social networks. The algorithm watermarks profile pictures during upload with user information to detect fake profiles. It aims to securely transmit images from users to cloud storage while preventing clone attacks. The technique uses DWT for data hiding in images, java static watermarking for image watermarking, and DCT for image compression.
This document proposes an encrypted image retrieval algorithm using discrete wavelet transform (DWT) and discrete cosine transform (DCT) to prevent fake profiles on social networks. The algorithm watermarks profile pictures during upload with user information to detect fake profiles. It aims to securely transmit images from users to cloud storage while preventing clone attacks. The technique uses DWT for data hiding in images, java static watermarking for image watermarking, and DCT for image compression.
FREQUENCY TO PREVENT FAKE PROFILES IN SOCIAL NETWORKS
Under the guidance of
S.Sivaranjani Prof. G.Thiagarajan M.Tech Final Year IT Department of Information Technology ABSTRACT • The millions of active users all around the world are using online social network, such as Facebook, Twitter. • These weaknesses make it effortless to misuse user’s information and do identity cloning attack to form fake profile. • In this proposed system, data hiding techniques to hide some information in profile pictures in order to detect fake profiles. ABSTRACT (contd)
• In this project we have proposed discrete wavelet
transform algorithm for data hiding. Thus this would prevent the clone attacks and providing complete user data privacy preserving. • Also when users upload the profile picture or photos it would be watermarked and updated. EXISTING SYSTEM • Fake accounts are categorized into what Facebook calls as duplicate accounts and false accounts. • According to an internal review by Facebook on a limited sample of its accounts, approximately 4.3% to 7.9% of Facebooks monthly active users represented duplicate accounts in 2013. • Clone attacks exists in 2 ways, single-site online social network and cross-sites online social networks. DISADVANTAGES:
In existing system there is no security for profile
pictures. This vulnerability is in Facebook as well. User pictures are misused for creating a fake profile. In existing system there is no effective secure transmission of images. Existing many applications use Huffman coding algorithm for image data hiding. PROPOSED SYSTEM • In the proposed approach, Data mining techniques and methods will be used to detect and identify such fake profiles. • In this method, at any time a user uploads his/her pictures, some exclusive and useful information such as email or username and also date of upload would be attached to pictures by means of watermarking methods. PROPOSED SYSTEM • Accordingly, in future, if somebody else saves that picture and attempts to create a fake profile with stolen data, the system is able to automatically detect this deception and fraud. Our proposed system invokes discrete wavelet transform algorithm for data hiding. • Thus this would prevent the clone attacks and providing complete user data privacy preserving. ADVANTAGES: User identity are secured. Clone attack would be prevented effectively in our proposed system. User can securely transmit the images from the user side to cloud using discrete wavelet transform. Clone attack is effectively prevented using new architecture involving java static watermarking technique. TECHNIQUES USED: Discrete Wavelet Transform (DWT) Steganography: Data hiding
Java static watermarking: Image watermarking
Discrete Cosine Transform (DCT): Image
Compression ARCHITECTURAL DESIGN MODULES DESCRIPTION • 1. Social Network • 2. Java Static Watermarking • 3. Image Steganography (DWT) • 4. Image Compression (DCT) • 5. Intrusion Detection • 6. Verification Alert • 7. Cloud Storage CONCLUSION • This project presents a brief knowledge about the attacks and defence mechanisms which are prominent on Online Social networks.
• It also explains the work which had been performed
in the field of detecting and preventing clone profiles and secure transmission of images from sender to receiver. Thank You!!!