Professional Documents
Culture Documents
Submitted by
KUMARESAN.R
18CSR091
MANOOWRANJITH.A.J
18CSR104
NANDHA KUMAR.S
18CSR116
of
BACHELOR OF ENGINEERING
IN
COMPUTER SCIENCE AND ENGINEERING
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
JUNE 2022
ii
JUNE 2022
BONAFIDE CERTIFICATE
partial fulfilment of the requirements for the award of the Degree of Bachelor of
Engineering in Computer Science and Engineering of Anna University, Chennai during the
Date :
Submitted for the end semester viva voce examination held on _____________
DECLARATION
submitted in partial fulfilment of the requirements for the award of Bachelor of Engineering is
the original work carried out by us. It has not formed the part of any other project report or
dissertation on the basis of which a degree or award was conferred on an earlier occasion on this
Date : KUMARESAN R
(Reg. No:18CSR091)
MANOOWRANJITH AJ
(Reg. No:18CSR104)
NANDHA KUMAR S
(Reg. No:18CSR116)
I certify that the declaration made by the above candidates is true to the best of my knowledge.
ABSTRACT
Data is the wealth of this century. Big social networking sites target for people for data to
enrich their business to reach billion dollar network. Data is not just a wealth, its a identity that
compromises the privacy of people. Encryption is not new to this world. A private data may
contain anything that user may interested to buy and sell. Data also includes browser history,
family photos and places where people regularly visit. It is the responsibility of the people to
protect their individual data. In today's world, companies tries to sell people’s data to increase
their wealth. Companies encrypt people’s data, but still companies use people data to make
Astrology sometimes cannot predict the good or bad habits of people but it is accepted
fact that data processing can predict whether a person is good or bad. Data shows people’s day to
day actives including the food they order in Swiggy, type of movies you like, list of your friends
circle and costumes people buy. It is true that surveillance is needed for prevention of mistakes
but not for selling people’s data in black market. Now it is proved that million dollar companies
collect people’s with digital personalized advertisements. image. Anger, disgust, fear, happiness,
This tesseract based encryption technique to prevent data breaches in chat data can make
a huge impact in preventing the spy of data in individual life. It prevent the third party apps from
monitoring the user conversations and user interest. It provides double layer of encryption which
ACKNOWLEDGEMENT
beloved Correspondent and all other philanthropic trust members of Kongu Vellalar Institute of
Technology Trust who have always encouraged us in the academic and co- curricular activities.
We are extremely thankful with no words of formal nature to the dynamic Principal
Dr. V. BALUSAMY, M.Tech., Ph.D., for providing the necessary facilities to complete our
work.
Department of Computer Science Engineering, Project Coordinator for her encouragement and
valuable advice that made us to carry out the project work successfully.
(SLG), Department of Computer Science Engineering, for her valuable ideas and suggestions,
which have been very helpful in the project. We are grateful to all the faculty members of the
TABLE OF CONTENTS
ABSTRACT iv
LIST OF TABLES vi
LIST OF FIGURES viii
LIST OF ABBREVIATIONS ix
1 INTRODUCTION 1
1.1 MACHINE LEARNING 2
1.1.2 SUPERVISED LEARNING 3
1.1.2 REINFORCEMENT ALGORITHM 3
1.1.3 OPTICAL CHARACTER RECOGNITION 3
1.1.4 OPENCV 4
1.1.5 TESERRACT 4
1.1.6 PYTESERRACT 5
2 LITERATURE REVIEW 6
3 SYSTEM REQUIREMENTS 9
3.1 HARDWARE REQUIREMENTS 9
3.2 SOFTWARE REQUIREMENTS 9
3.3 SOFTWARE DESCRIPTION 9
3.3.1 Pycharm 9
3.3.2 Python 10
3.3.3 Visual Studio Code 11
4 PROPOSED SYSTEM 12
4.1 INTRODUCTION 12
4.2 METHODOLOGY 12
4.3 FLOW DIAGRAM 13
4.4 WHITELISTING AND BLACKLISTING CHARACTERS 14
4.5 CORRECTING TEXT ORIENTATION 15
4.6 LANGUAGE TRANSLATION 16
vii
LIST OF FIGURES
LIST OF ABBREVIATIONS