MCA/M.Sc Project Titles
1.
Leveraging Social Networks for P2P
Content-Based File Sharing in Disconnected MANETs.
2.
A Novel Economic Sharing Model in a
Federation of Selfish Cloud Providers.
3.
Decentralized Access Control with
Anonymous Authentication of Data Stored in Clouds.
4.
Key-Aggregate Cryptosystem for Scalable
Data Sharing in Cloud Storage.
5.
A Probabilistic Misbehavior Detection
Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks.
6.
Secure and Efficient Data Transmission
for Cluster-Based Wireless Sensor Networks.
7.
Security evaluation of pattern
classifiers under attack.
8.
Multitouch Gesture-Based Authentication.
9.
AASR: Authenticated Anonymous Secure
Routing for MANETs in Adversarial Environments.
10.
Captcha as Graphical Passwords—A New
Security Primitive Based on Hard AI Problems.
11.
Internet Traffic Privacy Enhancement
with Masking: Optimization and Tradeoffs.
12.
Real-Time Scheduling with Security
Enhancement for Packet Switched Networks.
13.
PMSE: A Personalized Mobile Search
Engine.
14.
Image Quality Assessment for Fake
Biometric Detection: Application to Iris, Fingerprint, and Face
Recognition.
15.
A Fast Clustering-Based Feature Subset
Selection Algorithm for High-Dimensional Data.
16.
Spatial Query Integrity with Voronoi
Neighbors.
17.
Security evaluation of pattern classifiers
under attack.
18.
A Neighbor Coverage-Based Probabilistic
Rebroadcast for Reducing Routing Overhead in Mobile Ad Hoc Networks.
19.
EAACK—A Secure Intrusion-Detection
System for MANETs.
20.
EMAP: Expedite Message Authentication
Protocol for Vehicular Ad Hoc Networks.
21.
Vampire Attacks: Draining Life from
Wireless Ad Hoc Sensor Networks.
22.
Scalable and Secure Sharing of Personal
Health Records in Cloud Computing Using Attribute-Based Encryption.
23.
AMES-Cloud: A Framework of Adaptive
Mobile Video Streaming and Efficient Social Video Sharing in the Clouds.
24.
Image Fusion with Guided Filtering.
25.
Persuasive Cued Click-Points: Design,
Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism.
26.
Revisiting Defenses against Large-Scale
Online Password Guessing Attacks.
27.
OPASS: A User Authentication Protocol
Resistant to Password Stealing and Password Reuse Attack.
28.
ST-CDP: Snapshots in TRAP for Continuous
Data Protection.
29.
Improving Aggregate Recommendation
Diversity Using Ranking-Based Techniques.
30.
Horizontal Aggregations in SQL to
Prepare Data Sets for Data Mining Analysis.
31.
A Novel Anti Phishing Framework based on
Visual Cryptography.
32.
Resilient Identity Crime Detection.
33.
A Business Model for cloud computing
Based on a Separate Encryption and Decryption Services.
34.
One Size Does Not Fit All:
Towards User- and Query-Dependent Ranking For Web Databases.
35.
Harvesting Image Database From Web.
36.
Customer Relationship Management System
based on Data mining Technique.
37.
Demand draft withdrawal automatic in ATM
system.
38.
Unique code identification for voting
system.
39.
Student performance monitoring system.
40.
Online courier tracking system.
41.
File compression and decompression using
huffman algorithm.
42.
Graphical password authentication using
cued click points for e-commerce application.
43.
ATM reporting system.
44.
Automated online examination system.
45.
Image retrieval based on
multi-texton histogram.
46.
Image inpainting technique using local
binary pattern based texture in painting.
47.
A color edge detection algorithm in
rgb color space.
48.
Set with sms otp using two factor
authentications for e-shopping application.
49.
Information hiding using lsb
steganography.
50.
SMS based student attendance reporting
system.
51.
SMS based student marks reporting
system.
52.
RFID based attendance system.
53.
RFID based toll booth automation.
54.
RFID based voting system.
55.
Automobiles online selling.
56.
Tourism management system.
57.
Virtual mall shopping.
58.
Passport automation system.
59.
Library management system.
60.
Employment exchange management system.
61.
Web based college attendance
analysis system.
62.
Electricity online billing system.
63.
LIC management system.
64.
Cricket Statistics
65.
Online matrimonial
66.
Marketing and sales system.
67.
Call center management system.
68.
Online mobile shopping.
69.
Online blood bank system.
70.
Supermarket management system.
71.
Data mining analysis on EB bill system.
72.
Online product opinion and
ranking system.
73.
Flight booking portal.
74.
Online secure file transaction system.
75.
Online secure file transaction system.
76.
Online secure file transaction system.
77.
E-voting system.
78.
Website ranking system.
79.
Hospital management system.
80.
Global employee acclaimer.
81.
Intelligence missing items in shopping
cart.
82.
Entrepreneur sales report management.
83.
Efficient and secure data processing on
queries similarities.
84.
Cryptography on personal confidential
information.
85.
Online Video Sharing Portal.
86.
Online Job Portal.
87.
Graphical Password Authentication for
Online Banking Environment.
88.
Security in E-Banking using Visual
Cryptography Technique.
89.
Biometric Secured Centralized Voting
System.
90.
Random Password getting for
E-Applications.
91.
Students Information System.
92.
Automated Fingerprint Identification
System.
93.
Biometric Security Using Finger Print
Recognition.
94.
Face recognition using eigenfaces.
95.
Face Recognition Using Line Edge Map.
96.
Image-based Face Detection and
Recognition.
97.
Identity authentication system using
face recognition techniques in human-computer interaction.
98.
Multi-face Detection System in Video
Sequence.
99.
A novel way of tracking moving objects
in video scenes.
100.
Video object tracking using region split
and merge and a Kalman filter tracking algorithm.
101.
Real-time
implementation of Library management system using RFID.
102.
Real-time implementation
of Voter
credential system using RFID.
103.
RFID based Vehicle Tax Pay and Access
System.
104.
RFID based electronic passport
system.
105.
Smart card attendance system.
106.
Automated colored object sorting system
for pick and place application.
107.
Airline Reservation System.
108.
Hotel Reservation System.
109.
Railway Reservation System.
110.
Medical Agency Monitoring System.
111.
Computer Center Monitoring System.
112.
Crime File Information System.
113.
Patient Monitoring System.
114.
Pharmacy Management System.
115.
Gas Agency Management System.
116.
Cargo Information System.
117.
Online Shopping.
118.
Petrol Bulk Management System.
119.
Automated Palm Printing Identification
System.
120.
Online Multilevel Business.
121.
Automated License plate Recognition
122.
Web Search Engine Optimization.
123.
Automatic Cell Phone Messaging System.
124.
Online Customer Care.
125.
Online Marketing and Sales System.
126.
Audio Stenography for Data Hiding in
Wave Files.
127.
Performance Evaluation of Distance
Routing Algorithm in MANET.
128.
Data Mining for Network Intrusion
Detection.
129.
Human Resource Management System.
130.
Control of photo sharing
over Online Social Networks.
131.
Jewellery Shop Management System.
132.
Student Record and Information System.
133.
E-mail System.
134.
Railway Reservation System.
135.
Driving License Management System
136.
Bus Reservation System.
137.
ATM System.
138.
Tax Management System.
139.
Prison Management System
140.
Online Examination System.
141.
Online Medicine Purchase.
142.
Privacy
Concerns for Photo Sharing in Online Social Networks.
143.
Finance Management System.
144.
Implementation of Medical image
fusion techniques for multi-focus images.
145.
Web Based
Customer Favorite vehicle Search Engine.
146.
Employee Based
Performance Monitoring and Action Systems.
147.
Secure and
Cloud Based Patient Information Systems.
148.
Customer Sales Analysis System Based On Purchasing.
149.
Data
confidential against untrusted servers using attribute-
based encryption (ABE).
150.
College Result
Analysis.
151.
Multi Location Networked Mobile Auto Intimates.
152.
Entrepreneur
Sales Report Management.
153.
Reduce the
Password Guessing Attacks using Click Point.
154.
Advanced
One-Click User Web Search Engine.
155.
Online Tag
Based Image Retrieval and Effective
Management.
156.
Computational Perceptual Features for
Texture Representation and Retrieval.
157.
Web Page
re-Ranking System for Library.
158.
Online
Advertising System.
159.
Pre-paid Recharging System on Banking.
160.
Secure SMS
Transaction System on banking.
161.
E-Learning.
162.
Ensuring Data
Storage Security in Cloud Computing.
163.
E-Online job Recruitment.
164.
E-recharge
system.
165.
Enterprise
Stock and Accounting System.
166.
Disease
Information Hiding on Publishing
Healthcare Data.
167.
Multilevel
Images Authentication Systems.
168.
Client
Favorite Photo Search Engine on Web.
169.
Online Banking
With Fraud Detecting.
170.
Online
University.
171.
Robust
Data Authencitiy and Group Signature Mechanism for Enhanced Cloud Security
Process.
172.
Extended
Mobile Captcha Implementation.
173.
Face
recognition using gradient technique.
174.
Automobile
servicing center management.
175.
Hotel
Management system.
176.
Web Based Ticket Booking System.
177.
College attendance analysis system.
178.
Blood bank system.
179.
Bus
Management System.
180.
Courier
Information System.
181.
Student Record and Information System.
182.
Employee Based
Performance Monitoring.
183.
Fusion of MS and PAN Images Preserving Spectral
Quality.
184.
Automatic
Segmentation of Cloud Detection for All-Sky Images.
185.
Information Hiding using Text Embedding
in QR Codes
186.
Facial Emotion Recognition
Using Baysian Classification.
187.
Citizen card Management system.
188.
Fingerprint Image Enhancement.
189.
Network signature based on intrusion
detection system.
190.
Secure Data Transfer Over Internet Using
Image Steganography.
191.
A Web based academic monitoring system.
192.
Online Photo Gallery System.
193.
Web based Applications for Insurance
Services.
194.
Biometric Authentication System Using
Figer Tips.
195.
Mobile Recharging With Banking
Transaction
196.
Result Alert System With E-mail and SMS.
197.
Telephone Billing System.
198.
Bug Tracking System.
199.
Face Recognition in e-attendance.
200.
E Commerce Product Rating Based On
Customer Review Mining.
201.
Detecting E Banking Phishing Websites
Using Visual Cryptography.
202.
Railway Tracking and Arrival Time
Prediction.
203.
Online Loan Application &
Verification System.
204.
Secure Electronic Fund Transfer Over
Internet Using DES.
205.
Online Diagnostic Lab Reporting System.
206.
Timetable Management System.
207.
Internet Based Live Courier Tracking And
Delivery System.
208.
Detect moving objects and tracking based
on color and shape in real-time.
209.
Three Level Password Authentication
System.
210.
Secure ATM Using Card Scanning Plus OTP.
211.
Storage/Energy efficient Cloud Computing.
212.
Detecting Edges Using Image Processing.
213.
Automatic Toll Collection Project.
214.
Handwriting recognition using neural
networks.
215.
Information Hiding using Image Embedding
in QR Codes.
216.
Secure And Confidential Sharing Of
Personal Health Record In Outsourced Data.
217.
Face recognition using skin color and
template matching a soft computing approach.
218.
Wireless Surveillance system using Robot.
219.
Spoofing Prevention Method.
220.
Content Base Image retrieval by shape
matching.
221.
Enhanced secure password based
Authentication System.
222.
Evidence Based Access Control For Web
Services Implemented In A Mail Server.
223.
Demonstration Software for Edge
Detection and Segmentation.
224.
Spy Robotics.
225.
Human Face Identification.