dc.contributor.advisor | Mostakim, Moin | |
dc.contributor.author | Joy, Tanvir Ahmed | |
dc.contributor.author | Ahmed, Sultan Gias Uddin | |
dc.contributor.author | Ahmed, Mir Abrar | |
dc.contributor.author | Islam, Sazzad UL | |
dc.contributor.author | Nima, Menuka Tasnim | |
dc.date.accessioned | 2021-09-02T12:23:10Z | |
dc.date.available | 2021-09-02T12:23:10Z | |
dc.date.copyright | 2021 | |
dc.date.issued | 2021-06 | |
dc.identifier.other | ID 17101039 | |
dc.identifier.other | ID 16301151 | |
dc.identifier.other | ID 17101197 | |
dc.identifier.other | ID 17101457 | |
dc.identifier.other | ID 17101414 | |
dc.identifier.uri | http://hdl.handle.net/10361/14962 | |
dc.description | This thesis is submitted in partial fulfillment of the requirements for the degree of Bachelor of Science in Computer Science and Engineering, 2021. | en_US |
dc.description | Cataloged from PDF version of thesis. | |
dc.description | Includes bibliographical references (pages 49-51). | |
dc.description.abstract | The fast-growing cryptocurrency system is changing the financial world with its
ensured blockchain technology. It’s specific use in expounding cryptocurrencies is
highly acknowledged in the modern world, although the acceptance is growing in
several other domains such as the Internet of Things (IoT), Artificial Intelligence,
Fintech, and many other fields. Proof of Work (POW), which contains a digital ledger of transactions, plays a vital role in blockchain security. In addition,
Blockchain uses a changeable public key which ensures an extra layer of privacy by
containing individual user identity. Although, malwares has been planted to encapsulate the single user identity and the keys included in it. Focusing on Blockchain’s
significant features, possible vulnerabilities in the system and cryptography, we will
emphasize the deep learning process to generate hybrid public key in the blockchain
system which will be binding with the face recognition features delivering to a compact & secured cryptosystem leading towards protection of sensitive data. After
successfully generating the public & private key, we were able to implement those
keys in blockchain system creating a person’s wallet and verifying the signatures.
Our success rate in generating keys was close to 100% which were implemented in
blockchain. | en_US |
dc.description.statementofresponsibility | Tanvir Ahmed Joy | |
dc.description.statementofresponsibility | Sultan Gias Uddin Ahmed | |
dc.description.statementofresponsibility | Mir Abrar Ahmed | |
dc.description.statementofresponsibility | Sazzad UL Islam | |
dc.description.statementofresponsibility | Menuka Tasnim Nima | |
dc.format.extent | 51 pages | |
dc.language.iso | en | en_US |
dc.publisher | Brac University | en_US |
dc.rights | Brac University theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission. | |
dc.subject | Blockchain | |
dc.subject | Deep Learning | |
dc.subject | Public Key Cryptography | |
dc.subject | Hybrid Public Key | |
dc.subject | Facial Recognition | |
dc.subject.lcsh | Deep Learning | |
dc.title | Shield key: a deep learning process for the generation of public & private keys using hybrid architecture in blockchain | en_US |
dc.type | Thesis | en_US |
dc.contributor.department | Department of Computer Science and Engineering, Brac University | |
dc.description.degree | B. Computer Science | |