16-08-2014, 11:44 AM
Seminar Report On Cybernetics Protector
Cybernetics Protector.pdf (Size: 313.61 KB / Downloads: 28)
Abstract
the purpose of this paper is to present a website
for Secret Intelligence Agency. The agency has always
used undercover agents to solve complex cases and
dismantle criminal organizations. The paper presents a
solution so that Secret Intelligence Agencies and their
agents can communicate and exchangethe evidences in a
secured way. The paper presents Cybernetics Protector
developed using the J2EE technologies.
KeywordsͶSecret Intelligence Agency, Security, Face
Recognition, Digital Signature
INTRODUCTION
The Secret Intelligence Agency is the nation’s first line
of defence. It accomplishes what others cannot
accomplish and go where others cannot go. It carries
out the mission by collecting information that reveals
the plans, intentions and capabilities of the adversaries
and provides the basis for decision and action.The
Cybernetics Protector is software which allows a
security agency to handle various confidential missions
in a secured way. The Cybernetics Protector software is
concerned with the security of the country and thus
proper care has to be taken that confidential data from
within the database is not leaked out.
Every country requires a Secret Agency who
undertakes cases which are a threat to the national
security. These agencies operate with the help of
undercover agents who help solve these cases. Since
these cases deal with the nations’ security, the
communication and data transfer between the agents
and higher authorities need to be protected. Hence
developing such a system is necessary to help these
agencies operate in a secret and secured way
BACKGROUND
The Cybernetics Protector software is concerned
with the security of the country and thus proper care has
to be taken that confidential data from within the
database is not leaked out. The main focus of the
system is on security and thus the following sets of
features are used to provide high security.
• Encryption and Decryption
• Digital Signature
• Face Recognition Login
Encryption and Decryption[2]
This system is based on the 3 pillars of information
security- Confidentiality, Integrity and Availability. The
digital signature used here protects the integrity and
authenticity of a message. However other techniques
are still required to provide confidentiality of the
message being sent. Encryption is the process of
transforming information (referred to as plaintext) using
an algorithm (called a cipher) to make it unreadable to
anyone except those possessing special knowledge,
usually referred to as a key. The result of the process is
encrypted information (in cryptography, referred to as
cipher text).
In many contexts, the word encryption also
implicitly refers to the reverse process, decryption, to
make the encrypted information readable again (i.e. to
make it unencrypted). For this project uses inbuilt
package ‘javax.crypto
Digital Signature[1]
A digital signature is a mathematical scheme for
demonstrating the authenticity of a digital message or
document. A valid digital signature gives a recipient
reason to believe that the message was created by a
known sender, and that it was not altered in transit.
Any data/document which is sent through the system
will require the sender to digitally sign the data before
sending. The concept works in two stages, Signing and
Verification as illustrated in Figure 2(a) and 2(b)
respectively
Detect the face and convert it to useful forma
This step is to detect the faces from the image and
crop the face in required size and format. To do this,
project uses inbuilt “haar” function from openCv
library. This function detects face from the image and
gives rectangle’s coordinates as the output. Using these
coordinates face is cropped and converted to grayscale
image. Thereafter this image may be stored in the
database or can be used for face recognition.
Recognize face
Here the face from second step is taken as input
and compared with the face database. Cache file is
created from all images and this file is compared with
input face image. If the face is found to be matching, its
filename is returned. The id from this filename is
compared with user id who is logging in. If both the ids
match then the user getsan access to the site.
The following snapshots of the project screens
explain how face recognition is implemented and used
by different authorities of the Intelligence system.
Figure 4 is a login screen of the project which
redirects the user to face recognition module.
CONCLUSION
This project thus allows secret agencies to manage
secret cases in a secured and confidential way. The
secured login system which uses face recognition login
provides a high level of security. Digital Signatures and
encryption used will help to prevent unauthorized
access to data. Thus this project achieves information
security by following the 3 principles of
‘Confidentiality’, ‘Integrity’ and ‘Authenticity’