Python Project Search

Python Best Projects

Search The Available Python Projects Below Here

19 Results Found

Phishing Attack Detection Using Machine Learning With Flask Framework

Because Of The Fast Expansion Of Internet Users, Phishing Attacks Have Become A Significant Menace Where The Attacker Poses As A Trusted Entity In Order To Steal Sensitive Data, Causing Reputational Damage, Loss Of Money, Ransomware, Or Other Malware Infections. Intelligent Techniques Mainly Machine Learning (ML) And Deep Learning (D L) Are Increasingly Applied In The Field Of Cyber Security Due To Their Ability To Learn From Available Data In Order To Extract Useful Insight And Predict Future Events. The Effectiveness Of Applying Such Intelligent Approaches In Detecting Phishing Web Sites Is Investigated In This Paper. We Used Two Separate Datasets And Selected The Highest Correlated Features Which Comprised Of A Combination Of Content-based, URL Lexical-based, And Domain-based Features. A Set Of ML Models Were Then Applied, And A Comparative Performance Evaluation Was Conducted. Results Proved The Importance Of Features Selection In Improving The Models' Performance. Furthermore, The Results Also Aimed To Identify The Best Features That Influence The Model In Identifying Phishing Websites. For Classification Performance, Random Forest (RF) Algorithm Achieved The Highest Accuracy For Both Datasets.

Credit Card Fraud Detection Using Machine Learning As Data Mining Technique

Credit Card Fraud Detection Is Presently The Most Frequently Occurring Problem In The Present World. This Is Due To The Rise In Both Online Transactions And E-commerce Platforms. Credit Card Fraud Generally Happens When The Card Was Stolen For Any Of The Unauthorized Purposes Or Even When The Fraudster Uses The Credit Card Information For His Use. In The Present World, We Are Facing A Lot Of Credit Card Problems. To Detect The Fraudulent Activities The Credit Card Fraud Detection System Was Introduced. This Project Aims To Focus Mainly On Machine Learning Algorithms. The Algorithms Used Are Random Forest Algorithm And The ExtraTreesClassifier Algorithm. The Results Of The Two Algorithms Are Based On Accuracy, Precision, Recall, And F1-score. The ROC Curve Is Plotted Based On The Confusion Matrix. The Random Forest And The Extra-Trees Classifier Algorithms Are Compared And The Algorithm That Has The Greatest Accuracy, Extra-Trees Classifier Is Considered As The Best Algorithm That Is Used To Detect The Fraud.

An Improved Approach For LSB-Based Image Steganography Using AES Algorithm

The Security Of Any Public Key Cryptosystem Depends On The Private Key Thus, It Is Important That Only An Authorized Person Can Have Access To The Private Key. The Paper Presents A New Algorithm That Protects The Private Key Using The Transposition Cipher Technique. The Performance Of The Proposed Technique Is Evaluated By Applying It In The Random Forest Algorithm’s Generated Private Keys Using 512-bit, 1024-bit, And 2048-bit, Respectively. The Result Shows That The Technique Is Practical And Efficient In Securing Private Keys While In Storage As It Produced High Avalanche Effect. Key Generator Is Part Of The Stream Cipher System That Is Responsible For Generating A Long Random Sequence Of Binary Bits Key That Used In Ciphering And Deciphering Processes In Everyday Life, Image Security Is Important These Days As Data Is Increasing A Lot. These Data Can Be Images, Videos, Text, Audio, Etc. So To Protect These Images From Attackers Who Can Destroy The Image Quality Or Modify The Images, Some Technologies Like AES, DES, RSA, Etc. Have Been Invented. With The Generation, Data Security Has Also Become An Essential Issue. Considering These Issues, The Proposed Technique Ensures Confidentiality, Integrity, And Authentication. Using These Techniques, The Host Can Encrypt And Decrypt The Image ,text ,video ,audio. The Digital Technology Was Completely Different From Today And The Scale Of Challenges Was Smaller, So With Recent Advanced Technology And The Emergence Of New Applications Such As Big Data Applications, In Addition To Applications Running With 64-bit And Many Other Applications Have Become Necessary To Design A New Current Algorithm For Current Requirements. Advanced Encryption Algorithm (AES) Is A Symmetric Algorithm, Which We Will Further And In Addition To New Recommendations For Future Work, A List Of Shortcomings And Vulnerabilities Of The Internal Structure Of The AES Algorithm Will Be Diagnosed.

Image And Video Steganography Hide Text With Password Encrypt Into The Video Using Rc6 And LSB

For Secure Data Transmission Over Internet, It Is Important To Transfer Data In High Security And High Confidentiality, Information Security Is The Most Important Issue Of Data Communication In Networks And Internet. Either Image Or Video To Secure Transferred Information From Intruders, It Is Important To Convert The Information Into Cryptic Format The Image And Video Work On The Same Process. Different Methods Used To Ensure Data Security And Confidentiality During Transmission Like Steganography And Cryptography. This Paper We Convert Plaintext To Cipher Text For Doing So We Have Used RC6 Encryption Algorithm The Proposed Algorithm Ensure The Encryption And Decryption Using RC6 Stream Cipher And RGB Pixel Shuffling With Steganography By Using Hash-least Significant Bit (HLSB) That Make Use Of Hash Function To Developed Significant Way To Insert Data Bits In LSB Bits Of RGB Pixels Of Cover Image. The Security Evaluations For The Steganography Part We Will Be Using Modified LSB Algorithm Where We Overwrite The LSB Bits Of The Selected Frame (given By The User) From The Cover Video, With The Bit Of Text Message Character With Help Of Secret Key And Using KSA And PRGA.

An Efficient Student Attendance Scheme Based On QR Code

Student Attendance System Is Used To Measure Student Participation In A Classroom. Before Pandemic Attendance Was Taken Manually Like In Sheets Or Registers. But When The Pandemic Hit, Everything Was Online, So Even The Classes. The Attendance Count Is A Very Important Problem That The Administrator Needs To Be More Careful About Taking During The Online Classes As There Are Many Chances Of A Proxy Happening. So, We Came Up With This Proposed System “Student Attendance Using QR Code” This Paper Proposes An Attendance System That Is Based On The QR Code-based Attendance System. The Students Need To Scan The QR In The Class According To The Professor Instruction. The Paper Explains The High Level Implementation Details Of The Proposed System. It Also Discusses How The System Verifies Student Identity To Eliminate False Registrations.

Securing Cash Withdrawal From ATM Machine Using QR Code Technology

Nowadays, Dependency On Banking In The Virtual World Has Been Increased To The Peak Position. To Make It Consistent Advanced Technologies Should Be Used. As OTP Is Currently Used Worldwide For Security Purposes, It Can Be Overruled By QR Code. Main Advantage Of QR Code Over OTP Data Storage. OTP Can Only Confirm That The User Is Authorised User And Not Some Third Party Is Involved In This Transaction While QR Code Not Only Confirms The Authorised User But QR Code Itself Can Store Information Such As Transaction Id, Transaction Date, Time And Also Amount Of Transaction. So, There Is No Need Of Explicitly Keeping Track Of Transaction Every Transaction. Aim Of This Paper To Enhance The Functionality Of ATM Machine Using Android Application. Proposed System Is Combining The ATM And Mobile Banking And Minimizes The Time Of Withdrawing Cash From ATM. This Will Increase The Speed Of Transaction Almost Three Times Fast; Could Have Excellent Impact On Customer's Satisfaction. With The Help Of QR Code Information Get Encrypted So It Also Increases Security. As The Population Increasing ATM Queues Will Be Longer Day By Day. By Implementing Proposed System Current System Will Not Hampered, By Doing Some Minor Changes In Existing System It Will Be Possible To Get Cash Within Seconds. According To Analyst Report, Cost Of Transaction Using Mobile Application Is Almost Ten Times Less Than ATM And About Fifty Times Less, If Physical Bank Branch Used.

E-Health Data Interoperable And Discrete Data Exchange Between Hospital And Patient

In Order To Prevent Health Risks And Provide A Better Service To The Patients That Have Visited The Hospital, There Is A Need For Monitoring The Patients After Being Released And Providing The Data Submitted By The Patient E-Health Enablers To The Medical Personnel. This Article Proposes Architecture For Providing The Secure Exchange Of Data Between The Patient And The Hospital Infrastructure. The Implemented Solution Is Validated On A Laboratory Tested. When It Comes To Exchanging Health Data Between Departments Or Across Institutions, There Are So Many Variables At Play That Additional Rules And Descriptions Are Absolutely Necessary. There Can’t Be Any Ambiguity When Transferring And Interpreting Information About The Patient's Allergies Or The Procedures, Materials, And Medications Required.

Hospital Management System With QR Code Generator For Secure Purpose Of Hospital Data

Nowadays, Quick Response (QR) Codes Seem To Be Present Everywhere. They Can Be Found On Advertisements In Magazines, Websites, Product Packaging, And Other Places. Since Mobile Phones Have Become A Basic Necessity For Everyone, Using QR Codes Is One Of The Most Fascinating Ways To Link Patients To The Internet Digitally. QR Codes Consist Of Black Squares Arranged In A Grid (matrix) On A White Background And Are Read By Specialized Software That Is Able To Extract Data From The Patterns That Are Present In The Matrix. Now Days It Is Used Widely In Many Organizations. In This Project, We Proposed QR Code-based For Hospital Management System. The Emergence Of QR Has Opened A Vast Variety Of Possibilities In The Technology Sector Which Made Accessing, Retrieving And Viewing Information And Data From Anywhere With Great Speed And Low Fault. It Is A Captivating Way Of Accessing Anything From A Website. Nowadays Due To The Ample Use Of Mobile Devices, Using QR Code Technology We Can Easily Establish Connections And Communicate With People And Share Information. It Is Also A Secure Way To Share Or Secure The Data Because Without The Correct Tool Retrieving Of Data For Someone Else Who Is Not Intended To View Is Impossible. Introducing QR Code Will Increase This Security One More Level Further. In This Paper, This Is A Patient Management App That Uses Both Quick Response (QR) Code Technology Hospital And Accesses Those Data In A Secure And Fast Manner. It Also Can Be Used By Patients To Recollect The Doctor Consultation Data And Retrieving Their Medical Records And Doctor-prescribed Medicines.

A Shoulder Surfing Resistant Implementation Of Graphical Password Authentication System In Banking System

Graphical Password Is One Of Technic For Authentication Of Computer Security. The Most Crucial Aspect Of Computer Science Nowadays Is Digital/computer Security, Which Protects User Or Customer Data. And One Of The Hazards Is Shoulder-surfing, In Which A Criminal Can Acquire A Password By Watching Directly Or By Recording The Authentication Session. There Are A Number Of Methods For This Authentication, But The Most Popular And Straightforward Is The Graphic Password Method. A Bank Is Essential To People's Daily Lives. The Bank's Top Priority Is The Security Of Its Customers. To Safeguard User Accounts, The Authentication Process Must Be Secure. Textual Passwords Are A Frequently Used Method. The System Uses The Graphical Password To Demonstrate The Banking Website's Security In Order To Offer A Possible Substitute For The Traditional Alphanumeric Password Techniques To Prevent Shoulder Surfing Techniques.

Secret-Key Generation In Many-To-One Networks Encrypt And Decrypt With Key And Verification

The Security Of Any Public Key Cryptosystem Depends On The Private Key Thus, It Is Important That Only An Authorized Person Can Have Access To The Private Key. The Paper Presents A New Algorithm That Protects The Private Key Using The Transposition Cipher Technique. The Performance Of The Proposed Technique Is Evaluated By Applying It In The Random Forest Algorithm’s Generated Private Keys Using 512-bit, 1024-bit, And 2048-bit, Respectively. The Result Shows That The Technique Is Practical And Efficient In Securing Private Keys While In Storage As It Produced High Avalanche Effect.

Intrusion Detection System Using PCA With Random Forest Approach Machine Learning

With The Evolution In Wireless Communication, There Are Many Security Threats Over The Internet. The Intrusion Detection System (IDS) Helps To Find The Attacks On The System And The Intruders Are Detected. Previously Various Machine Learning (ML) Techniques Are Applied On The IDS And Tried To Improve The Results On The Detection Of Intruders And To Increase The Accuracy Of The IDS. This Paper Has Proposed An Approach To Develop Efficient IDS By Using The Principal Component Analysis (PCA) And The Random Forest Classification Algorithm. Where The PCA Will Help To Organise The Dataset By Reducing The Dimensionality Of The Dataset And The Random Forest Will Help In Classification. Results Obtained States That The Proposed Approach Works More Efficiently In Terms Of Accuracy As Compared To Other Techniques Like SVM, Naive Bayes, And Decision Tree. The Results Obtained By Proposed Method Are Having The Values For Performance Time (min) Is 3.24 Minutes, Accuracy Rate (%) Is 96.78 %, And The Error Rate (%) Is 0.21 %.

Fake News Detection Using Machine Learning

The Phenomenon Of Fake News Is Experiencing A Rapid And Growing Progress With The Evolution Of The Means Of Communication And Social Media. Fake News Detection Is An Emerging Research Area Which Is Gaining Big Interest. It Faces However Some Challenges Due To The Limited Resources Such As Datasets And Processing And Analyzing Techniques. In This Work, We Propose A System For Fake News Detection That Uses Machine Learning Techniques. We Used Term Frequency Inverse Document Frequency Of Bag Of Words And N-grams As Feature Extraction Technique, And Naïve Bayes As A Classifier. We Propose Also A Dataset Of Fake And True News To Train The Proposed System. Obtained Results Show The Efficiency Of The System

Facebook Application Detecting Malicious Facebook Applications

With Daily Installs, Third-party Apps Can Be A Important Cause For The Popularity And Attractiveness Of Facebook Or Any Online Social Media. Sadly, Cyber Criminals Get Came To The Realization That The Capability Of Using Apps For Spreading Spam And Malware. We Realize That At The Least 13% Of Facebook Apps In The Dataset Are Usually Malevolent. However With Their Findings , Several Issues Like Faux Profiles, Malicious Application Have Conjointly Full-grown. There Aren't Any Possible Method Exist To Regulate These Issues. During This Project, We Tend To Came Up With A Framework With That Automatic Detection Of Malicious Applications Is Feasible And Is Efficient. Suppose There's Facebook Application, Will The Facebook User Verify That The App Is Malicious Or Not. First We Identify A Set Of Features That Help Us To Analyze Malicious From Benign Ones. Second, Leveraging These Distinguishing Features ,where We Show That Post Of Application As Malicious With 95.9% Accuracy. Finally, We Explore The Ecosystems Of Malicious Facebook Apps And Identify Mechanisms That These Apps Use To Spread.

E-Health Data Interoperable And Discrete E-health Data Exchange Between Hospital And Patient

In Order To Prevent Health Risks And Provide A Better Service To The Patients That Have Visited The Hospital, There Is A Need For Monitoring The Patients After Being Released And Providing The Data Submitted By The Patient EHealth Enablers To The Medical Personnel. This Article Proposes Architecture For Providing The Secure Exchange Of Data Between The Patient Mobile Application And The Hospital Infrastructure. The Implemented Solution Is Validated On A Laboratory Testbed.

Voice Chatting And Video Conferencing WebRTC Role In Real-Time Communication And Video Conferencing

Real-time Communication (RTC) Is A New Standard And Industry-wide Effort That Expand The Web Browsing Model, Allowing Access To Information In Areas Like Social Media, Chat, Video Conferencing, And Television Over The Internet, And Unified Communication. These Systems Users Can View, Record, Remark, Or Edit Video And Audio Content Flows Using Time-critical Cloud Infrastructures That Enforce The Quality Of Services. However, There Are Many Proprietary Protocols And Codecs Available That Are Not Easily Interoperable And Scalable To Implement Multipoint Videoconference Systems. WebRTC (Web Real-Time Communication) Is A State-of-the-Art Open Technology That Makes Real-time Communication Capabilities In Audio, Video, And Data Transmission Possible In Real-time Communication Through Web Browsers Using JavaScript APIs (Application Programming Interfaces) Without Plug-ins. This Paper Aims To Introduce The P2P Video Conferencing System Based On Web Real-Time Communication (WebRTC). In This Paper, We Have Proposed A Web-based Peer-to-peer Real-time Communication System Using The Mozilla Firefox Together With The ScaleDrone Service That Enables Users To Communicate With Highspeed Data Transmission Over The Communication Channel Using WebRTC Technology, HTML5 And Use Node.js Server Address. Our Experiments Show That WebRTC Is A Capable Building Block For Scalable Live Video Conferencing Within A Web Browser.

Video Sternography A New Video Steganography Scheme Based On Shi-Tomasi Corner Detector

Recent Developments In The Speed Of The Internet And Information Technology Have Made The Rapid Exchange Of Multimedia Information Possible. However, These Developments In Technology Lead To Violations Of Information Security And Private Information. Digital Steganography Provides The Ability To Protect Private Information That Has Become Essential In The Current Internet Age. Among All Digital Media, Digital Video Has Become Of Interest To Many Researchers Due To Its High Capacity For Hiding Sensitive Data. Numerous Video Steganography Methods Have Recently Been Proposed To Prevent Secret Data From Being Stolen. Nevertheless, These Methods Have Multiple Issues Related To Visual Imperceptibly, Robustness, And Embedding Capacity. To Tackle These Issues, This Paper Proposes A New Approach To Video Steganography Based On The Corner Point Principle And LSBs Algorithm. The Proposed Method First Uses Shi-Tomasi Algorithm To Detect Regions Of Corner Points Within The Cover Video Frames. Then, It Uses 4-LSBs Algorithm To Hide Confidential Data Inside The Identified Corner Points. Besides, Before The Embedding Process, The Proposed Method Encrypts Confidential Data Using Arnold’s Cat Map Method To Boost The Security Level.

Secret Key Generation Securing Private Key Using New Transposition Cipher Technique

The Security Of Any Public Key Cryptosystem Depends On The Private Key Thus, It Is Important That Only An Authorized Person Can Have Access To The Private Key. The Paper Presents A New Algorithm That Protects The Private Key Using The Transposition Cipher Technique. The Performance Of The Proposed Technique Is Evaluated By Applying It In The RSA Algorithm’s Generated Private Keys Using 512-bit, 1024-bit, And 2048-bit, Respectively. The Result Shows That The Technique Is Practical And Efficient In Securing Private Keys While In Storage As It Produced High Avalanche Effect.

QR Code Generation And Recognition For Data Security A Desktop Application Of QR Code For Data Security And Authentication

Initially The Barcodes Have Been Widely Used For The Unique Identification Of The Products. Quick Response I.e. QR Codes Are 2D Representation Of Barcodes That Can Embed Text, Audio, Video, Web URL, Phone Contacts, Credentials ¬¬and Much More. This Paper Primarily Deals With The Generation Of QR Codes For Question Paper. We Have Proposed Encryption Of Question Paper Data Using AES Encryption Algorithm. The Working Of The QR Codes Is Based On Encrypting It To QR Code And Scanning To Decrypt It. Furthermore, We Have Reduced The Memory Storage By Redirecting To A Webpage Through The Transmission And Online Acceptance Of Data.

E-Health Data Detecting The Malicious Application Using Frappe

Communication Technology Has Completely Occupied All The Areas Of Applications. Last Decade Has However Witnessed A Drastic Evolution In Information And Communication Technology Due To The Introduction Of Social Media Network. Business Growth Is Further Achieved Via These Social Media. Nevertheless, Increase In The Usage Of Online Social Networks (OSN) Such As Face Book, Twitter, Instagrametc Has However Led To The Increase In Privacy And Security Concerns. Third Party Applications Are One Of The Many Reasons For Facebook Attractiveness. Regrettably, The Users Are Unaware Of Detail That A Lot Of Malicious Facebook Applications Provide On Their Profile. The Popularity Of These Third Party Applications Is Such That There Are Almost 20 Million Installations Per Day. But Cyber Criminals Have Appreciated The Popularity Of Third Party Applications And The Possibility Of Using These Apps For Distributing The Malware And Spam. This Paper Proposes A Method To Categorize A Given Application As Malicious Or Safe By Using FRAppE (Facebook’s Rigorous Application Evaluator), Possibly One Of The First Tool For Detecting Malicious Apps On The Facebook. To Develop The FRAppE, The Data Is Gathered From MyPagekeeper Application, A Website That Provides Significant Information About Various Third Party Applications And Their Insight Into Their Behavior.