Privacy preserving video chat using object segmentation in python
Privacy preserving video chat using object segmentation
PROJECT ID: PYTHON21
PROJECT
NAME: Privacy
preserving video chat using object segmentation
PROJECT CATEGORY: MCA / BCA / BCCA / MCM / POLY / ENGINEERING
PROJECT ABSTRACT:
With the rapid development of mobile cloud, multimedia data like imageis a major challenge to maintain security and privacy for mobile users. Encryption isone of the best solutions to protect data. However, traditional encryption algorithmsare not suitable for images which they were proposed for text data. In this paper, wepropose an image encryption technique called privacy-preserving lightweight imageencryption (PPLiIE) to make an encryption in a simple way, suitable for images and tomaintain privacy. PPLiIE algorithm proceeds with a three-step process to secure theimage data in mobile before storing to the cloud. We implement in Python languageand analyze our results with various file images to conclude that the encryption timeof the PPLiIE is reduced to 50% approximately than the encryption time of AES.In addition, the measurement of key sensitivity and file with variation of chunk sizehave expressed superior performance of PPLiIE. Finally, we review various securityattacks against PPLiIE to express the security level.
SOFTWARE REQUIREMENTS:
OS : Windows
Python IDE : Python 2.7.x and above
Language : Python Programming
Database : MYSQL
HARDWARE REQUIREMENTS:
RAM : 4GB and Higher
Processor : Intel i3 and above
Hard Disk : 500GB Minimum
Conclusion
AI models can be companies’ bread and butter, many of which provide predictive capabilities to developers through APIs or, more recently, through downloadable software. Model privacy is the last of the four pillars that must be considered and is also core to both user and company interests. Companies will have little motivation to provide interesting products and spend money on improving AI capabilities if their competitors can easily copy their models (an act which is not straightforward to investigate).
TABLE OF CONTENTS
·
Title
Page
·
Declaration
·
Certification
Page
·
Dedication
·
Acknowledgements
·
Table of
Contents
·
List of
Tables
·
Abstract
CHAPTER SCHEME
CHAPTER ONE: INTRODUCTION
CHAPTER TWO: OBJECTIVES
CHAPTER THREE: PRELIMINARY
SYSTEM ANALYSIS
·
Preliminary
Investigation
·
Present System in Use
·
Flaws In Present System
·
Need Of New System
·
Feasibility Study
·
Project Category
CHAPTER FOUR: SOFTWARE
ENGINEERING AND PARADIGM APPLIED
·
Modules
·
System / Module Chart
CHAPTER FIVE: SOFTWARE AND
HARDWARE REQUIREMENT
CHAPTER SIX: DETAIL SYSTEM
ANALYSIS
·
Data Flow Diagram
·
Number of modules and
Process Logic
·
Data Structures and Tables
·
Entity- Relationship
Diagram
·
System Design
·
Form Design
·
Source Code
·
Input Screen and Output
Screen
CHAPTER SEVEN:
TESTING
AND VALIDATION CHECK
CHAPTER EIGHT:
SYSTEM SECURITY MEASURES
CHAPTER NINE:
IMPLEMENTATION, EVALUATION &
MAINTENANCE
CHAPTER TEN:
FUTURE SCOPE OF THE PROJECT
CHAPTER ELEVEN: SUGGESTION AND CONCLUSION
CHAPTER TWELE: BIBLIOGRAPHY& REFERENCES
Other
Information
PROJECT
SOFWARE |
ZIP |
PROJECT REPORT PAGE |
60
-80 Pages |
CAN BE USED IN |
Marketing
(MBA) |
PROJECT COST |
1500/-
Only |
PDF SYNOPSIS COST |
250/-
Only |
PPT PROJECT COST |
300/-
Only |
PROJECT WITH SPIRAL BINDING |
1750/-
Only |
PROJECT WITH HARD BINDING |
1850/-
Only |
TOTAL
COST (SYNOPSIS, SOFTCOPY, HARDBOOK, and SOFTWARE, PPT) |
2500/-
Only |
DELIVERY TIME |
1
OR 2 Days (In
case Urgent Call: 8830288685) |
SUPPORT / QUERY |
|
CALL |
8830288685 |
|
help@projectsready.in |
[Note:
We Provide Hard Binding and Spiral Binding only Nagpur Region] |
PROJECT ID: PYTHON21
PROJECT
NAME: Privacy
preserving video chat using object segmentation
PROJECT CATEGORY: MCA / BCA / BCCA / MCM / POLY / ENGINEERING
PROJECT ABSTRACT:
With the rapid development of mobile cloud, multimedia data like imageis a major challenge to maintain security and privacy for mobile users. Encryption isone of the best solutions to protect data. However, traditional encryption algorithmsare not suitable for images which they were proposed for text data. In this paper, wepropose an image encryption technique called privacy-preserving lightweight imageencryption (PPLiIE) to make an encryption in a simple way, suitable for images and tomaintain privacy. PPLiIE algorithm proceeds with a three-step process to secure theimage data in mobile before storing to the cloud. We implement in Python languageand analyze our results with various file images to conclude that the encryption timeof the PPLiIE is reduced to 50% approximately than the encryption time of AES.In addition, the measurement of key sensitivity and file with variation of chunk sizehave expressed superior performance of PPLiIE. Finally, we review various securityattacks against PPLiIE to express the security level.
SOFTWARE REQUIREMENTS:
OS : Windows
Python IDE : Python 2.7.x and above
Language : Python Programming
Database : MYSQL
HARDWARE REQUIREMENTS:
RAM : 4GB and Higher
Processor : Intel i3 and above
Hard Disk : 500GB Minimum
Conclusion
AI models can be companies’ bread and butter, many of which provide predictive capabilities to developers through APIs or, more recently, through downloadable software. Model privacy is the last of the four pillars that must be considered and is also core to both user and company interests. Companies will have little motivation to provide interesting products and spend money on improving AI capabilities if their competitors can easily copy their models (an act which is not straightforward to investigate).
TABLE OF CONTENTS
·
Title
Page
·
Declaration
·
Certification
Page
·
Dedication
·
Acknowledgements
·
Table of
Contents
·
List of
Tables
·
Abstract
CHAPTER SCHEME
CHAPTER ONE: INTRODUCTION
CHAPTER TWO: OBJECTIVES
CHAPTER THREE: PRELIMINARY
SYSTEM ANALYSIS
·
Preliminary
Investigation
·
Present System in Use
·
Flaws In Present System
·
Need Of New System
·
Feasibility Study
·
Project Category
CHAPTER FOUR: SOFTWARE
ENGINEERING AND PARADIGM APPLIED
·
Modules
·
System / Module Chart
CHAPTER FIVE: SOFTWARE AND
HARDWARE REQUIREMENT
CHAPTER SIX: DETAIL SYSTEM
ANALYSIS
·
Data Flow Diagram
·
Number of modules and
Process Logic
·
Data Structures and Tables
·
Entity- Relationship
Diagram
·
System Design
·
Form Design
·
Source Code
·
Input Screen and Output
Screen
CHAPTER SEVEN:
TESTING
AND VALIDATION CHECK
CHAPTER EIGHT:
SYSTEM SECURITY MEASURES
CHAPTER NINE:
IMPLEMENTATION, EVALUATION &
MAINTENANCE
CHAPTER TEN:
FUTURE SCOPE OF THE PROJECT
CHAPTER ELEVEN: SUGGESTION AND CONCLUSION
CHAPTER TWELE: BIBLIOGRAPHY& REFERENCES
Other
Information
PROJECT
SOFWARE |
ZIP |
PROJECT REPORT PAGE |
60
-80 Pages |
CAN BE USED IN |
Marketing
(MBA) |
PROJECT COST |
1500/-
Only |
PDF SYNOPSIS COST |
250/-
Only |
PPT PROJECT COST |
300/-
Only |
PROJECT WITH SPIRAL BINDING |
1750/-
Only |
PROJECT WITH HARD BINDING |
1850/-
Only |
TOTAL
COST (SYNOPSIS, SOFTCOPY, HARDBOOK, and SOFTWARE, PPT) |
2500/-
Only |
DELIVERY TIME |
1
OR 2 Days (In
case Urgent Call: 8830288685) |
SUPPORT / QUERY |
|
CALL |
8830288685 |
|
help@projectsready.in |
[Note:
We Provide Hard Binding and Spiral Binding only Nagpur Region] |
Comments
Post a Comment
If you have any doubt let me know