FACE RECOGNITION TECHNOLOGY.ppt free download


Face recognition is an attractive biometric for use in security applications. Face  recognition is non-intrusive, it can be performed without the subject’s knowing. This become particularly important in modern times because demand for enhanced  security  is in public interest.
q      Facial recognition is a form ofcomputer vision that uses faces to attempt to identify a person or verify a person’s claimed identity.  Regardless of specific method used.            
    To identify any person we generally look at face and eyes in particular seem to tell a story how the person feels.
  Face recognition is a kind of electronic unmasking.
  To identify any person we generally look at face and eyes in particular seem to tell a story how the person feels.
  Face recognition is a kind of electronic unmasking.
  It is a unique measurable characteristics of a human being
  Used to automatically recognize an individual’s identity
  Two types 1.physiological &
                   2. behavioral characteristics
 A “biometric system” refers to integrated hardware and software used to conduct biometric identification

 


Migration From GSM Network To GPRS Seminar Topic .pp free Download

— Migration From GSM Network To GPRS is  Global System for Mobile (GSM) is a second generation cellular standard developed to cater voice services and data delivery using digital modulation. 

Developed by Group Spéciale Mobile (founded 1982) which was an    initiative of CEPT ( Conference of European Post and Telecommunication )
Aim : to replace the incompatible analog system
Presently the responsibility of GSM standardization resides with special mobile group under ETSI ( European telecommunication Standards Institute )
Full set of specifications phase-I became available in 1990
Under ETSI, GSM is named as “ Global System for Mobile communication “
Today many providers all over the world use GSM (more than 135
Countries in Asia, Africa, Europe, Australia, America)
More than 1300 million subscribers in world and  45 million subscriber in India.
              Download .ppt


Mobile TV Seminar Topic .ppt Free Download


Definition of Mobile TV
Mobile TV is the wireless transmission and reception of television content - video and voice - to platforms that are either moving or capable of moving.  Mobile TV allows viewers to enjoy personalized, interactive television with content specifically adapted to the mobile medium. The features of mobility and personalized consumption distinguish mobile TV from traditional television services.  The experience of viewing TV over mobile platforms differs in a variety of ways from traditional television viewing, most notably in the size of the viewing screen.
The technologies used to provide mobile TV services are digitally based,the terms unicast and multicast are used in the same way they are used for IPTV.  That is, unicasting is transmission to a single subscriber, while multicasting sends content to multiple users.  These definitions also correspond to those given for similar Internet-based applications. For network operators, the challenge has become: 'How can large-scale delivery of high-quality multimedia to wireless devices be implemented profitably?' Although delivery of this type of content is technically feasible over today's existing unicast networks such as 3G, these networks cannot support the volume and type of traffic required for a fully realized multimedia delivery service (many channels delivered on a mass market scale). Offloading multicast (one-to-many) multimedia traffic to a dedicated broadcast network is more efficient and less costly than deploying similar services over 3G networks



               Download .ppt




XML ENCRYPTION .ppt Seminar Free Download

}As XML becomes a predominant means of linking blocks of information together, there is a requirement to secure specific information. That is to allow authorized entities access to specific information and prevent access to that specific information from unauthorized entities. Current methods on the Internet include password protection, smart card, PKI, tokens and a variety of other schemes. These typically solve the problem of accessing the site from unauthorized users, but do not provide mechanisms for the protection of specific information from all those who have authorized access to the site.


}Now that XML is being used to provide searchable and organized information there is a sense of urgency to provide a standard to protect certain parts or elements from unauthorized access. The objective of XML encryption is to provide a standard methodology that prevents unauthorized access to specific information within an XML 
XML Encryption provides end-to-end security for applications that require secure exchange of structured data

Sending documents over a network, storage in a database and exchange between applications in encrypted form can be useful as part of other security measures.
          Download .ppt


PALM VEIN TECHNOLOGY SEMINAR .PPT FREE DOWNLOAD

qPalm vein technology is one of upcoming technology.
qIt is the world’s first contact less personal identification system that uses the vein patterns in human palms to confirm a person’s identify.
q It is highly secure and accurate.
qThe contact less feature gives it a hygienic advantage over other biometric authentication technologies
It is easy and natural to use, fast and Highly accurate.
It consist of a small palm vein scanner.

A vein picture is taken an palm pattern is store in scanner display register.
                                    DOWNLOAD.PPT


Java database connectivity seminar .ppt free download


outline
JDBC Driver
About JDBC URLs
    .How to Make the Connection
The Statement Object
How to Query the Database
The ResultSet Object
Mapping Database Types to Java Types
How to Close the Connection
Using Statement
Using Transactions
    .JDBC 2 – Scrollable Result Set
JDBC 2 – Updateable ResultSet
SQLJ   
JDBC is a standard interface for connecting to relational databases from Java.
The JDBC classes and interfaces are in the java.sql package.

JDBC 1.22 is part of JDK 1.1; JDBC 2.0 is part of Java 2



                                                        Download.ppt


DYNAMIC DOMAIN NAME SERVICE SEMINAR .PPT FREE DOWNLOAD

Dynamic Doman Name Service (DNS) providers offer a free and paid service which allows the aliasing of dynamic (DHCP) IP addresses to static host names and the provision of Uniform Resource Indicator (URI) redirection services etc.
DNS  is a service that  maps a local name to an IP address and conversely an address to a name.
How it Workè DNS works by dividing the inter network into a set of domains or networks that can be further subdivided into sub domains.
               Download.ppt file




Artificial Intelligence Seminar Topic Free download

Artificial Intelligence is a lot of different things to a lot of different people. Let's go through a few things that AI is thought to be and situate them within the broader picture of AI.
qArtificial intelligence (AI): Computers with the ability to mimic or duplicate the functions of the human brain
qArtificial intelligence systems: The people, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines that demonstrate the characteristics of intelligence
Computational models of human behavior:
One thing it could be is "Making computational models of human behavior". Since we believe that humans are intelligent, therefore models of intelligent behavior must be AI. There's a great paper by Turing who really set up this idea of AI as making models of human behavior (link). In this way of thinking of AI, how would you proceed as an AI scientist? One way, which would be a kind of cognitive science, is to do experiments on humans, see how they behave in certain situations and see if you could make computers behave in that same way.
                      Donload Seminar




Use Any Computer Without Leaving a Trace with Tails



Hear a new tricks of the computer .
 If James Bond logs on to a computer, he doesn't want to leave a bunch of files, cookies, or his IP address out there for someone to find. It might seem extreme, but sometimes it's a good idea to take the same precautions yourself.
In this post, we'll walk through how to use a USB stick or DVD to anonymize, encrypt, and hide everything you do on a computer no matter where you are. When we say "browse without leaving a trace", we truly mean it. Using the Linux-based, live-boot operating system Tails (The Amnesiac Incognito Live System), you can use any computer anywhere without anyone knowing you were ever on it. Tails is a portable operating system with all the security bells and whistles you'll ever need already installed on it. You can install Tails on one of your many dust-gathering USB drives or a DVD. We'll show you how to set up your own portable boot disc in the second section, but let's start by taking a look at what you get with Tails.

What Tails Is and What's Packed Into It

The magic of Tails is that you don't have to do a lick of work: once you create your boot disc you'll have a completely anonymous, totally private operating system preloaded with all the software you (or James Bond) would need. What's packed into it? Let's take a look.

The Software Packed Directly into Tails

Browse Like Bond: Use Any Computer Without Leaving a Trace with Tails
Once you create your Tails boot disc, you'll be ready to reboot your computer into an encrypted and private operating system preloaded with all the software you'll need to browse the web, email, IM, and edit documents. Regardless of whether you choose a DVD or USB nothing you do is left on the computer you booted from

  • Built-in online anonymity: The key feature that's going to appeal to most people is Tails' built-in online anonymity. This comes in the form of the customized web browser Iceweasel built using the anonymous web browsing technology from Tor. The browser also includes popular security extensions like HTTPS Everywhere for secure browsing, Adblock Plus to block ads, and NoScript to block Java and Flash. Other than those features, the web browser works exactly like you'd expect a web browser to work.
  • Built-in encrypted email and chat: Additionally, you also get encrypted and private messaging. Tails includes the Claws email client with OpenPGP for email encryption and the instant messaging client Pidgin with an OTR cryptography tool that encrypts your IM conversations.
  • Built-in file encryption: When boot Tails from a USB drive instead of a DVD, you can save documents to the thumb drive and they're automatically encrypted using an encryption specification called LUKS. (Since the DVD is read-only, you can't save any files—which is its own form of security.)
  • A full suite of editing software: On top your web access being private you also get a full suite of work and creative software. Tails comes preloaded with Openoffice for editing documents, Gimp for editing photos, Audacity for editing sound, and plenty more additional software.
Now let's walk through how to set up a boot disc for yourself.

Step-by-Step Guide to Set Up Your Own Tails DVD or USB Drive

Tails is pretty easy to set up on your own and it doesn't differ much from setting up any other Linux Live CD. However, a few extra steps do exist to verify your download.

Step 1: Download the Necessary Files

You need to download two different files to get started with Tails: an ISO (an image of Tails that is burned to a disc) and a cryptographic signature to verify the ISO image:

  1. Cryptographic Signature (Direct download / Torrent)
The developers behind Tails recommend you verify your Tails ISO to make sure it's an officially released version that hasn't been tampered with. We won't walk through that process here, but they have instructions on their web site for Windows and Mac or Linux.

Step 2: Burn Tails to a CD/DVD

You can find documentation for creating a Tails USB from scratch on each operating system here. Alternately, you can more easily make bootable USB installation of Tails after you boot from a Tails live DVD. For our purposes we're going to burn Tails to a bootable DVD because it's an easier process than creating a USB stick from scratch.





Seminar On Anonymous Communication ppt

Definition of Anonymous Communication
Anonymous communication is a necessary measure to protect the privacy of users, and protect computer systems against traffic analysis. Anonymity systems seeks to build an infrastructure running on top of the existing Internet protocols that allows people to communicate with each other without necessarily revealing their personal network identifiers. The basic idea behind any anonymous system is to provide unlinkability between communicating parties by relaying traffic through a number of intermediate nodes. If the messages are delayed and buffered at these intermediate nodes then they can provide stronger anonymity.
Such message based systems are suitable for high latency anonymous applications such as anonymous email. Such sytems are called Mix based system. Circuit based randomized routing techniques like Onion Routing and TOR are used for providing low latency applications like anonymous web browsing or remote login. All these anonymous systems are used by are used by diverse group of users to protect their identities on the Internet
Introduction of CHAUM’S MIX
It is a concept introduced by David Chaum which is based on public key cryptography that allows an electronic mail system to hide whom a participant communicates with as well as the content of the communication . The basic building block of such a high latency anonymous communication systems is a mix. At a high level ,a mix is a process that accepts encrypted messages as input and groups several messages together into a batch , and then decrypts and
forwards some or all of the messages in the batch.

The principal idea is that messages to be anonymized are relayed through a mix. The mix has a well-known RSA public key, and messages are divided into blocks and encrypted using this key. Upon receiving a message, a mix decrypts all the blocks, strips out the first block that contains the address of the recipient, and appends a block of random bits (the junk) at the end of the message. The length of the junk is chosen to make messages size invariant. The most important property that the decryption and the padding aim to achieve is bitwise unlinkability.
An observer, or an active attacker, should not be able to find the link between the bit pattern of the encoded messages arriving at the mix and the decoded messages departing from the mix. More precisely, a mix first generates a public and private key pair and makes the public component known to clients who wish to relay messages through the mix .We let C = Ex (M) denote encryption of a message M with mix x’s publickey, and also let M = Dx(C) denote decryption of a cipher text C with mix x’s corresponding privatekey. Further ,we let Ax represent the identity or address of mix x (e.g., x’sIPaddress).
Consider a sender , Alice , who wants to anonymously send a message M to a recipient , Bob ,via a single mix x .Then , Alice would compute Ex (Rx , M, AB),where Rx is a string of random bits and AB is Bob’s address . She then sends the resulting cipher text to the mix, which can use its privatekey to retrieve M and AB. Rx is simply discarded, but is included in the encryption to help prevent an adversary from identifying two identical messages encrypted under the same asymmetric key . Also alice could first encrypt Message M using publickey of Bob so that even the mix couldn’t read it. This can be concisely represented as
Ex (Rx , M, AB) → M.
The mix collects messages into a batch until it has received “enough” ,and then forwards each to the destination address extracted from the decrypted input message