International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017
p-ISSN: 2395-0072
www.irjet.net
PROTECTING FACEBOOK ACCOUNT FROM MALICIOUS ATTACKING APPLICATIONS Sandhya Dayalan[1], M.S.Vinmathi[2] [1]Student of Computer Science and Engineering Department, Panimalar Engineering College, Tamil Nadu, India [2]Associate Professor of Computer Science and Engineering Department, Panimalar Engineering College, Tamil Nadu, India ---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract –This paper introduces a novel rankbased strategy for picture watermarking. In the watermark implanting process, the host picture is separated into pieces, trailed by 2-D discrete cosine change (DCT). For each picture obstruct, a mystery key is utilized to arbitrarily choose an arrangement of DCT coefficients appropriate for watermark inserting. Watermark bits are embedded into a picture hinder by changing the arrangement of DCT coefficients utilizing a rankbased installing standard. In the watermark discovery prepare, the comparing recognition lattices are shaped from the obtained picture utilizing the Secret key. A short time later, the watermark bits are removed by checking the positions of the discovery frameworks. Since the proposed watermarking strategy just uses two DCT coefficients to conceal one watermark bit, it can accomplish high installing limit. In addition, our strategy is free of host flag impedance. This coveted element and the use of a blunder cushion in watermark installing results in high power against assaults. Hypothetical examination and test comes about showing the adequacy of the proposed technique.
media interchanges, programming designing, information development or PC outlining. A Computer network empowers interpersonal correspondences allowing customers to pass on capably and adequately through various means: email, messaging, visit rooms, telephone, video telephone calls, and video conferencing. Offering access to information on shared stockpiling contraptions is a key part of numerous Networks. A PC Network or data Network is a media correspondences mastermind which grants center points to share resources. Eg. The Internet! Today facebook is one of the most popular social networking sites to share photos and text messages with our friends family members. But there are many chances of the data (photos, texts) getting hacked while we share it in facebook. Hackers are people who try to break into PC frameworks for any illicit reason or people who malevolently break into frameworks for personal gain .
1.1 Related Work. Detecting Spam on OSNs: Gao et al. [11] analyzed posts on the walls of 3.5 million Facebook users and showed that 10% of links posted on Facebook walls are spam. They also presented techniques to identify compromised accounts and spam campaigns. In other work, Gao et al. [12] and Rahman et al. [10] develop efficient techniques for online spam filtering on OSNs such as Facebook. While Gao et al. [12] rely on having the whole social graph as input, and so is usable only by the OSN provider, Rahman et al. [10] develop a third-party application for spam detection on Facebook.
Key Words: Secret Key, Computerized watermarking , Encryption and Decryption.
In contrast to all of these efforts, rather than classifying individual posts as spam, we focus on giving protection to our account as well as the photos or text messages we send and also detect the malicious hackers who try to hack
1. Introduction. Networking is one of the most interesting concepts of study in the field of computer science today. Computer Networking may be seen as a branch of electrical building,
Š 2017, IRJET
|
Impact Factor value: 5.181
|
ISO 9001:2008 Certified Journal
|
Page 1830