0% found this document useful (0 votes)
25 views9 pages

Project Synopsis

The document discusses a proposed project on developing a matrimonial web application using machine learning to understand user behavior and suggest appropriate matches. It will analyze profiles to find real matches beyond just age, faith or caste. The methodology section outlines extracting meaningful information from PDFs using text analysis algorithms. Hardware requirements include a computer with 4GB RAM and a 2.2GHz dual-core processor while software includes Windows 10, XAMPP server, and technologies like PHP, HTML, JavaScript and MySQL.

Uploaded by

Pranu Londhe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views9 pages

Project Synopsis

The document discusses a proposed project on developing a matrimonial web application using machine learning to understand user behavior and suggest appropriate matches. It will analyze profiles to find real matches beyond just age, faith or caste. The methodology section outlines extracting meaningful information from PDFs using text analysis algorithms. Hardware requirements include a computer with 4GB RAM and a 2.2GHz dual-core processor while software includes Windows 10, XAMPP server, and technologies like PHP, HTML, JavaScript and MySQL.

Uploaded by

Pranu Londhe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

DEPARTMENT OF COMPUTER ENGINEERING

Ashok Institute of Engineering & Technology Polytechnic Ashoknagar


Tal. Shrirampur, Dist. Ahmedanagar
2022-2023

PROJECT SYNOPSIS

Submitted By:
1. Londhe Pranali Babasaheb
2. Aher Swarangi Sudhir
3. Nawale Utkarsha Surendra
4. Jagadale Neha Bapusaheb

On 3 / 10 / 2022

Prof. V.D.Ghogare Prof. D.R.Cholke


GUIDE PROJECT CO-ORDINATOR

Institute Code: - 1560

1
:INTRODUCTION:

Direct mixing of pseudo-random number and biometric data-BioHashing is an extremely


convenient mechanism with which to incorporate physical tokens, such as smart card, USB token
etc.thereby resulting in two factors (token+biometrics) credentials via tokenised randomization
Human authentication is the security task whose job is to limit access to physical locations or
computer network only to those with authorisation. This is done by equipped authorised users
with passwords, tokens or using their biometrics. Unfortunately, the first two suffer a lack of
security as they are easy being forgotten and stolen; even biometrics also suffers from some
inherent limitation and specific security threats. A more practical approach is to combine two or
more factor authenticator to reap benefits in security or convenient or both. This paper proposed
a novel two factor authenticator based on iterated inner products between tokenised pseudo-
random number and the user specific fingerprint feature, which generated from the integrated
wavelet and Fourier–Mellin transform, and hence produce a set of user specific compact code
that coined as BioHashing. BioHashing highly tolerant of data capture offsets, with same user
fingerprint data resulting in highly correlated bitstrings. Moreover, there is no deterministic way
to get the user specific code without having both token with random data and user
fingerprint feature. This would protect us for instance against biometric fabrication by
changing the user specific credential, is as simple as changing the token containing the
random data. The BioHashing has significant functional advantages over solely
biometrics i.e. zero equal error rate point and clean separation of the genuine and
imposter populations, thereby allowing elimination of false accept rates without
suffering from increased occurrence of false reject rates. We all want that no one can
access our private data without our permission. For that, we use secret key (password or PIN)
like in our different gadgets or in ATM card. But that secre t key can be stolen and once it is, we will
have no control on our data.

2
LITERATURE SURVEY:

One of the best passwordauthentication systems was text based or alphanumerical based password
which has several problems. One of the main problems with textbased password is it was tiresome to
remember several text passwords for different account. Then introduction of biometric password [1]
and token-based password was considered as the alternative of the text-based password, but it again
has several drawbacks like cost and unavailability issue. To overcome the disadvantages of text-based
password and token-based password the invention of graphical password is introduced. Initially there
were following graphical password authentication systems: A. Pass point. B. Cued Click Point (CCP). C.
Persuasive Cued Click Points (PCCP). But this system had again disadvantage of hot spot problem. To
overcome the disadvantage of hot spot problem invention of cued click point is made.

1. Pass Point:

S. Wiedenbeck et al [2], have invented the pass point system for password authentication. The concept
of the pass point was as simple as just clicking five point on single image and combination of this point
as a password. In this system user has to select five points from single image and at the time of
password selecting and during the time of login user has to repeat the same sequence of the points
from single image. But the main security problem with this was the HOTSPOT, the area where the user
clicks. User choose the easy to memorable passwords to which can be easily guessed by hacker. To avoid
this problem the next method is implemented.

2. Cued Click Point:

To overcome the disadvantage of the pass point authentication system the cued click point is invented.
Cued click points [3] has the same concept as of the pass point but the main difference between them is
passing five points on five different image one point per image.

3
3. Persuasive-Cued Click Point (PCCP):

The persuasive cued click point [4][5] is the addition of the persuasive feature to cued click point. It
allows user to select less portable password. It has two more function as shuffle and viewport, when
users make a secret word, the images are a little monochromic except for viewport for to avoid known
hotspots the viewport. The most useful benefit of PCCP is make complex system to hackers. Users have
to choose a clickable area [6] within the area and cannot click outside of the viewport unless they press
the shuffle button to randomly reposition the viewport. At the time of password creation users may
shuffle as many times as he wants. Only during the password generation, the viewport & shuffle buttons
are displayed. After the secrete word generation process, graphical images are presented to users
casually without the viewport & shuffle button. Then user has to choose exact clickable area on
particular image. Now a day’s PCCP is a best technology but has security problems related with it.

4. A novel graphical method :

This method of authentication that employs graphical coordinates along with a novel introduction of
time interval between successive clicks. A novel Graphical Password scheme is proposed in this paper
which tries to meet the criteria of ease of use and the security at the same time. The scheme has a large
password space and the simple implementation makes it easy for the user to create her password and
memorize it too.

4
PROBLEM DEFINITION

Existing matrimonial systems are developed to search out the match between
bride/groom per their age, faith or caste. But the drawback of such systems is it doesn't match the
behavior of the bride/groom to find out the perfect match. To find out the perfect match and
understand the behavior we proposed a Matrimonial Web Application which uses Machine
Learning to understand the user's behavior and suggest real-time appropriate profiles.

5
PROPOSED METHODOLOGY FOR SOLVING IDENTIFY
PROBLEM

We are introducing a system that allows user to extract meaningful information from a
particular pdf, by using text characteristic algorithms. User has to upload the file into our system
and system will get process on that file and give output to user.

6
DESIGN AND PROCEDURE

7
RESOURCES & CONSUMABLE REQUIRED

Hardware Requirements:

 4 GB RAM
 2.20 GHz Dual-Core CPU Processor

Software Requirements:

 Windows 10
 XAMPP Server
 PHP, HTML, JAVASCRIPT
 MYSQL Server

8
ACTION PLAN

You might also like