Deepan FInal
Deepan FInal
Deepan FInal
By
142219104021
Deepan Surya Raj S V Under the guidance of
III year CSE-1 Mr. M. Sudarsanam.M.Tech.,
ABSTRACT
Google Chrome extensions are apps that can be installed in Chrome to alter its functionality. This
can include adding new capabilities to Chrome or changing the program's existing behaviour to
make it more user-friendly. A screenshot, also known as a screen cap or screengrab, is a digital
snapshot that depicts the contents of a computer screen. Screenshots allow you to capture exactly
what's on your screen for later sharing or reference. Taking, saving, and sharing screenshots can
come in handy. Some argue that the screenshot is the most important aspect of the internet. In this
project, a Chrome browser was developed, which has features like taking screenshots of the
webpage, taking long screenshots, capturing multiple screenshots, and screen recording. And these
captured screenshots can be downloaded in different formats, i.e., jpg, png, pdf. In the multiple
screenshot feature, users can choose an option called "combine into a single pdf" so that multiple
screenshots can be downloaded in a single pdf. Within the screen recorder, the video can be
downloaded in two different formats, i.e., webm and mp4.
LITERATURE SURVEY
TITLE AUTHOR ABSTRACT PROS CONS SUGGEST
WebSecAsst Neelam Singh A browser extension,also known as a Detects the Gut this Extension
- A Machine Gurjar plugin or an addon, is a small software virus in the extension is should be
Learning Sudheendra S S R application that adds functionality to a website also a third government
based Chejarla Santosh web browser. However, security threats and maintains party. authorized
Chrome Kumar are always linked with such software the privacy
Extension Krishnaveni K. S where data can be compromised and
ultimately trust is broken. The proposed
research work jas developed a security
model named WebSecAsst, which is a
chrome plugin relying on the Machine
Learning model XGBoost and VirusTotal
to detect malicious websites visited by
the user and to detect whether the files
downloaded from the internet are
Malicious or Safe. During this detection,
the proposed model preserves the
privacy of the user's data to a greater
extent than the existing commercial
chrome
extensions.
TITLE AUTHOR ABSTRACT PROS CONS SUGGEST
Secure Asma K. Al- Tabnabbing is a new form of phishing. Protects the Some lack of Improve
Internet on Khamis The impact of malicious attempt begins internet users efficiency efficieny
Google Ayman A. with identity theft and ends with from being
Chrome: Khalafallah financial loss. That has encouraged some victims
Client side security specialists and researchers to
anti- tackle tabnabbing attack, but their
tabnabbing studies are still in their infancy and not
extension sufficient. The work done here focuses
on developing an effective anti
tabnabbing extension for the Google
Chrome browser to protect Internet
users from been victims as well as raise
their awareness. The system developed
has a novel significance due to its
effectiveness in detecting a tabnabbing
attack and the combination of two
famous approaches used to combat
online attacks. The success of the system
was examined by performance
measurements such as confusion matrix
and ROC. The system produces promising
results.
TITLE AUTHOR ABSTRACT PROS CONS SUGGEST
On the Muhammad In this work, we developed a web Verfies the text To verify the Avoid
developmen Nomani Kabir extension on Google Chrome browser to of the webpage text with the direct
t of a web Omar Tayan verify online texts by simply clicking on with the database the access to
extension Yasser Alginahi an extension button. Upon clicking the databse extension the data as
for text Md Munirul button, the underlying algorithm in the need to be a the data
authenticati Hasan extension software retrieves the texts authorized might get
on on Md Arafatur from the current web-page being stolen
Google Rahman displayed. Verification and authentication
Chrome of texts are performed by comparing the
retrieved texts with text database.
According to the comparison, texts are
highlighted in colors. We consider
authentication of Arabic Hadith texts for
a case study. The authentic Hadith texts
are highlighted by green color; authentic
texts with partial diacritics, by yellow;
and unauthentic texts, by red. This
technique can also be used to
authenticate laws, constitutions and
Government documents in any language.
TITLE AUTHOR ABSTRACT PROS CONS SUGGEST
Striving with Evgeny Pyshkin In this paper, we examine a problem of Focus on the As it is a Try to
online Maxim addictive IT services and discuss existing user chrome control
addiction Mozgovoy tools for human self-control and self- cooperation extension it is and
with a self- Alexander assessment. Current web technologies only for monitor
control Chisler support simple on-demand access to browsers. over all
chrome Yulia Volkova various media streaming services. Despite screen
extension evident positive factors of such
entertainment product delivery methods,
there are concerns about their
addictiveness. To respond to this problem
there are time-management tools helping
the users to set their short- and long-term
goals and to follow them. The drawback of
existing tools is blocking access to a
service rather than on cooperating with a
user by attempting to switch users'
attention away from an addictive product.
We discuss possible scenarios for such a
commitment tool implemented as a
Google Chrome browser extension for
managing time spent on TV-series online
streaming services.
TITLE AUTHOR ABSTRACT PROS CONS SUGGEST
Analyzing Lujo Bauer In this paper we focus on Chrome extensions, Guards agains It is a external Support
the dangers Shaoying Cai to which the Chrome browser exports a rich the misuse extension. If a for local
posed by Limin Jia API: extensions can potentially make network virus is storage
requests, access the local file system, get low-
Chrome Timothy Passaro already too.
level information about running processes,
extensions Yuan Tian etc. To guard against misuse, Chrome uses a present in the
permission system to curtail an extension's local storage
privileges. We demonstrate a series of attacks then it can be
by which extensions can steal data, track user undetected
behavior, and collude to elevate their
privileges. Subtler versions can easily be
devised that are less likely to be prevented by
proposed defenses and can evade notice by
the user. We quantify the potential danger of
attacks by examining how many currently
available extensions have sufficient privileges
to carry them out. As many web sites do not
employ defenses against such attacks, we
examine how many popular web sites are
vulnerable to each kind of attack. Our results
show that a surprisingly large fraction of web
sites is vulnerable to many attacks, and a large
fraction of currently available extensions is
potentially able to carry them out.
EXISTING SYSTEM
A native screenshot tool is a built-in screen recorder in a browser or operating system that allows
you to record your webcam, screen, or both at once. For example, both Windows 10 and Windows
11 come with built-in screen capture tools (Snip & Sketch and Snipping Tool), as well as a variety of
keyboard shortcuts that make taking a screenshot a breeze. Chrome also includes a built-in screen
recorder that may be accessed through keyboard shortcuts. With these integrated screen recording
tools, you may record a piece of your screen, your full screen, a tab, or your entire browser.
PROPOSED SYSTEM
In this proposed project, a separate integrated chrome extension for screen shot long screenshot
and screen recording is developed, which overcomes the shortcomings of the previous existing
system in that there is no need to crop for eliminating the headers in the navigation bar, and you
can choose your desired format. In the suggested system, the extension can be applied to any
platform, including Whatsapp, Facebook, and email, with the crucial function of file sharing. The
project has been improved with the time-consuming issue shown in the existing project screenshot.
This project focuses solely on the webpage, allowing users to be free of headers and the bottom
navbar.
SOFTWARE REQUIREMENT
FRONTEND
HTML:
HTML stands for Hyper Text Markup Language, which is a programming language used to
create web pages and apps. Let's look at what the terms Hypertext Markup Language and Web page
signify. "Text within Text" is what Hyper Text signifies. A hypertext is a text that has a link. You have
clicked on a hypertext when you click on a link that takes you to a new webpage. HyperText is a
technique for connecting two or more web pages (HTML documents). A markup language is a
computer language for applying formatting and layout principles to text documents. The markup
language makes text more dynamic and interactive.
CSS:
CSS (Cascading Style Sheets) is a simple design language designed to make the process of
making web pages presentable easier. The style and feel of a web page is handled by CSS. You can use
CSS to change the text colour, font style, paragraph spacing, how columns are scaled and laid out, what
background pictures or colours are used, layout designs, display variants for different devices and
screen sizes, and a range of other effects. HTML and CSS design is a must have talent if you wish to
pursue a career as a professional web designer. CSS is simple to learn and understand, but it gives you a
lot of power over how an HTML document looks. CSS is frequently used in conjunction with the
markup languages HTML or XHTML.
Javascript:
JavaScript is an interpreted, lightweight programming language. It is intended for the
development of network-centric applications. It works in tandem with and complements Java. Because
JavaScript is interwoven with HTML, it is incredibly simple to use. It's free to use and cross-platform.
Javascript is the most widely used programming language in the world, making it an excellent choice
for programmers. When you learn JavaScript, you can use it to create powerful frontend and back-end
software utilising Javascript-based frameworks like jQuery and Node.JS. JavaScript is omnipresent; it's
built into every modern web browser, so there's no need to set up a special environment to learn it.
JavaScript is supported by Chrome, Mozilla Firefox, Safari, and every other browser available today.
Use Case:
Module 2 : Multiple Screenshot
Description:
In this module, users are able to take multiple screenshots as they desire, and they are given two
options: to combine into a single PDF and to download them individually.
Use Case:
Module 3 : Long Screenshot
Description:
In this module, the current active webpage's link is collected using the Chrome API, and using an API, a
long screenshot is received to that given active link and, can be downloaded in the preferred format i.e.,
PNG,JPEG,WEBP and PDF.
Use Case:
Module 4 : Screen recorder
Description:
In this module, the current active webpage activity is recorded, and this recording can be downloaded in
the preferred format, i.e., mp4 and webm.
Use Case:
CONCLUSION
This project focuses on screenshots, extended screenshots, multiple screenshots, and screen
recordings. In comparison to the present project, these implementations are more efficient and
speedier. This project can be useful for web developers or web bloggers who want to take screenshots
or record the screen so that they can document it in the future because the webpage will be updated
frequently with newer versions. When the button for screenshot or screen recording is clicked, it
provides a quicker option to download the image/video in a single click without the header of the
browser and navbar of the windows or any operating system.
PUBLISHED PAPER
THANKYOU