Skip to content

This is a junior design project done for CSE299 course in North South university, Bangladesh. This project was directed by Dr. Nabeel Mohammed. The project is based upon the theories of AES encryption and Decryption, Google oAuth authentication and image authentication.

Notifications You must be signed in to change notification settings

NafisFaiyaz007/the-amazing-project

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

81 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

What is the Amazing APP?

“The Amazing App”, a web-based application which is used for encrypting and decrypting confidential files online is a implementation targeting to overcome the crisis. The app is designed in such a way so that a user is able to user their google account to sign up and use facial recognition system as a 2nd factor authentication to log into the app. After a successful login, the user can import files from their google drive, encrypt or decrypt them as when necessary.

The initial goal of the “The Amazing App” web-app is to create a platform where the user can encrypt and decrypt a file using the app. The decrypted file can be viewed within the app using a file viewer, and the encrypted file can be stored to the users google drive. The user can also import files from their local disk use the app features.

The app provides a 2-Factor authentication where the first step is Google Oauth2.0 authentication and the second step is an image authentication. In google Oauth authentication, the user needs to sign up using their google account and after successful sign up, the user is redirected for image authentication. For image authentication and recognition, the app uses FACE IO API which is a robust service for face authentication service.

About

This is a junior design project done for CSE299 course in North South university, Bangladesh. This project was directed by Dr. Nabeel Mohammed. The project is based upon the theories of AES encryption and Decryption, Google oAuth authentication and image authentication.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 3

  •  
  •  
  •