IT Projects

Fake Product Review Monitoring & Removal For Genuine Ratings Php

Download Project Document/Synopsis As most of the people require review about a product before spending their money on the product. So people come across various reviews in the website but these reviews are genuine or fake is not identified by the user. In some review websites some good reviews are added by the product company …

Fake Product Review Monitoring & Removal For Genuine Ratings Php Read More »

Face Detection Using Mobile Vision API

Download Project Document/Synopsis This System is an innovative Application allowing the System to detect faces using the phones Camera. This system makes use of the Mobile Vision API by Google. The System basically works as follows; the user should take the phone over any picture or anywhere with people, the system using the Mobile Vision …

Face Detection Using Mobile Vision API Read More »

Watermark Images Using Discrete Cosine Transform

Download Project Document/Synopsis Here we proposed a system where you can hide message image into RGB image. Here we used digital watermarking for embedding. Digital watermarking is a technology for embedding various types of information in digital content. A digital watermark is digital signal or pattern inserted into digital content. We had used Discrete Cosine …

Watermark Images Using Discrete Cosine Transform Read More »

Detecting E Banking Phishing Using Associative Classification

Download Project Document/Synopsis There are number of users who purchase products online and make payment through e- banking. There are e- banking websites who ask user to provide sensitive data such as username, password or credit card details etc often for malicious reasons. This type of e-banking websites is known as phishing website. In order …

Detecting E Banking Phishing Using Associative Classification Read More »

Android Text Encryption Using Various Algorithms

Download Project Document/Synopsis Users communicate over all social media, but messages are not secured when it passes through network. Intruder can access user’s message easily. We want to secure users communication over all social media. So here we proposed a system where user will enter the plain text and select the algorithm type from AES,DES,MD5,….. …

Android Text Encryption Using Various Algorithms Read More »