You are on page 1of 9

IMPLEMENTING A TESSERACT-BASED ENCRYPTION

TECHNIQUE TO PREVENT DATA BREACHES IN CHAT


DATA
A PROJECT REPORT
(Project Work I Phase II)

Submitted by

KUMARESAN.R
18CSR091

MANOOWRANJITH.A.J
18CSR104

NANDHA KUMAR.S
18CSR116

in partial fulfilment of the requirements


for the award of the degree

of

BACHELOR OF ENGINEERING
IN
COMPUTER SCIENCE AND ENGINEERING
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

KONGU ENGINEERING COLLEGE


(Autonomous)

PERUNDURAI ERODE – 638 060

JUNE 2022
ii

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

KONGU ENGINEERING COLLEGE


(Autonomous)

PERUNDURAI ERODE – 638060

JUNE 2022

BONAFIDE CERTIFICATE

This is to certify that the Project report IMPLEMENTING A TESSERACT-BASED

ENCRYPTION TECHNIQUE TO PREVENT DATA BREACHES IN CHAT is the

bonafide record of project work done by KUMARESAN R (18CSR091),

MANOOWRANJITH A J (18CSR104) and NANDHA KUMAR S (18CSR116) in

partial fulfilment of the requirements for the award of the Degree of Bachelor of

Engineering in Computer Science and Engineering of Anna University, Chennai during the

year 2021 - 2022.

SUPERVISOR HEAD OF THE DEPARTMENT


(Signature with seal)

Date :

Submitted for the end semester viva voce examination held on _____________

INTERNAL EXAMINER EXTERNAL EXAMINER


iii

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

KONGU ENGINEERING COLLEGE


(Autonomous)
PERUNDURAI ERODE - 638060
JUNE 2022

DECLARATION

We affirm that the Project Report titled IMPLEMENTING A TESSERACT-BASED

ENCRYPTION TECHNIQUE TO PREVENT DATA BREACHES IN CHAT being

submitted in partial fulfilment of the requirements for the award of Bachelor of Engineering is

the original work carried out by us. It has not formed the part of any other project report or

dissertation on the basis of which a degree or award was conferred on an earlier occasion on this

or any other candidate.

Date : KUMARESAN R
(Reg. No:18CSR091)

MANOOWRANJITH AJ
(Reg. No:18CSR104)

NANDHA KUMAR S
(Reg. No:18CSR116)

I certify that the declaration made by the above candidates is true to the best of my knowledge.

Date : Name and Signature of the Supervisor with seal


iv

ABSTRACT

Data is the wealth of this century. Big social networking sites target for people for data to

enrich their business to reach billion dollar network. Data is not just a wealth, its a identity that

compromises the privacy of people. Encryption is not new to this world. A private data may

contain anything that user may interested to buy and sell. Data also includes browser history,

family photos and places where people regularly visit. It is the responsibility of the people to

protect their individual data. In today's world, companies tries to sell people’s data to increase

their wealth. Companies encrypt people’s data, but still companies use people data to make

money. Companies know how to break their encryption.

Astrology sometimes cannot predict the good or bad habits of people but it is accepted

fact that data processing can predict whether a person is good or bad. Data shows people’s day to

day actives including the food they order in Swiggy, type of movies you like, list of your friends

circle and costumes people buy. It is true that surveillance is needed for prevention of mistakes

but not for selling people’s data in black market. Now it is proved that million dollar companies

collect people’s with digital personalized advertisements. image. Anger, disgust, fear, happiness,

sadness, surprise, and neutral are among the emotions.

This tesseract based encryption technique to prevent data breaches in chat data can make

a huge impact in preventing the spy of data in individual life. It prevent the third party apps from

monitoring the user conversations and user interest. It provides double layer of encryption which

prevents companies from collecting out data.


v

ACKNOWLEDGEMENT

We express our sincere thanks and gratitude to Thiru.P.SACHITHANANDAN our

beloved Correspondent and all other philanthropic trust members of Kongu Vellalar Institute of

Technology Trust who have always encouraged us in the academic and co- curricular activities.

We are extremely thankful with no words of formal nature to the dynamic Principal

Dr. V. BALUSAMY, M.Tech., Ph.D., for providing the necessary facilities to complete our

work.

We would like to express our sincere gratitude to Dr.N.SHANTHI M.E., Ph.D.,

Professor and Head of the Department for providing necessary facilities.

We extend our thanks to Dr.K.S.KALAIVANI M.E., Ph.D., Assistant Professor (Sr.G),

Department of Computer Science Engineering, Project Coordinator for her encouragement and

valuable advice that made us to carry out the project work successfully.

We extend our gratitude to our Supervisor Dr.PCD. KALAIVAANI M.E., Ph.D., AP

(SLG), Department of Computer Science Engineering, for her valuable ideas and suggestions,

which have been very helpful in the project. We are grateful to all the faculty members of the

Computer Science and Engineering Department, for their support.


vi

TABLE OF CONTENTS

CHAPTER TITLE PAGE


NO. NO.

ABSTRACT iv
LIST OF TABLES vi
LIST OF FIGURES viii
LIST OF ABBREVIATIONS ix
1 INTRODUCTION 1
1.1 MACHINE LEARNING 2
1.1.2 SUPERVISED LEARNING 3
1.1.2 REINFORCEMENT ALGORITHM 3
1.1.3 OPTICAL CHARACTER RECOGNITION 3
1.1.4 OPENCV 4
1.1.5 TESERRACT 4
1.1.6 PYTESERRACT 5
2 LITERATURE REVIEW 6
3 SYSTEM REQUIREMENTS 9
3.1 HARDWARE REQUIREMENTS 9
3.2 SOFTWARE REQUIREMENTS 9
3.3 SOFTWARE DESCRIPTION 9
3.3.1 Pycharm 9
3.3.2 Python 10
3.3.3 Visual Studio Code 11
4 PROPOSED SYSTEM 12
4.1 INTRODUCTION 12
4.2 METHODOLOGY 12
4.3 FLOW DIAGRAM 13
4.4 WHITELISTING AND BLACKLISTING CHARACTERS 14
4.5 CORRECTING TEXT ORIENTATION 15
4.6 LANGUAGE TRANSLATION 16
vii

4.7 CLOUD OCR APIs 16


4.8 IMAGE PROCESSING 16
4.9 TEXT BOUNDING BOX LOCALIZATION 17
4.10 OCR RESULTS WITH SPELL CHECKING 18
5 RESULT AND DISCUSSION 19
6 CONCLUSION AND FUTURE WORK 22
APPENDIX 23
REFERENCES 31
viii

LIST OF FIGURES

FIGURE NO. FIGURE NAME PAGE NO.

1.1 Working of Machine Learning Model 2


4.1 Sender Flow Diagram 13
4.2 Receiver Flow Diagram 14
4.3 Input Image 15
4.4 Output Image 15
4.5 RGB to BGR with OpenCV 17
4.6 Text Bounding Box localization 17
4.7 Represents Accuracy of preprocessed data and 18
raw data over time
5.1 Sending normal image 19
5.2 Automatically encrypted with background 19
program
5.3 Sending encrypted message 20
5.4 Decryption with OCR in transparent window 20
5.5 Decryption with OCR in color window 21
ix

LIST OF ABBREVIATIONS

ANN : Artificial Neural Network


API : Application Programming Interface
Adagrad : Adaptive Gradient Algorithm
Adam : Adaptive Moment Estimation
CK+ : Extended Cohn - Kanade Dataset
CNN : Convolutional Neural Network
CoLab : Colaboratory
ConvNets : Convolutional Networks
CPU : Central Processing Unit
CSV : Comma-separated values
FACS : Facial Action Coding System
FER : Facial Expression Recognition
GPL : General Public License
GPU : Graphical Processing Unit
GUI : Graphical User Interface
ICML : International Conference of Machine Learning
IDE : Integrated Development Environment
LBP : Local Binary Patterns
MFC : Microsoft Foundation Class
Nadam : Nesterov-accelerated Adaptive Moment Estimation
NMF : Nonnegative Matrix Factorization
RAM : Random Access Memory
ReLU : Rectified Linear Unit
RMSPro : Root Mean Square Propagation
p
RNN : Recurrent Neural Network
SGD : Stochastic Gradient Descent
SVM : Support Vector Machine

You might also like