SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 142
“Clipboard Manager”
Ms. Kiran Bahaniya1, Ms. Komal Dhote2, Ms. Laxmi ogale3, Prof. Ashish Palandurkar4,
Prof. Mahvash Khan5
1,2,3 Students, Dept of Computer Science & Engineering, Nagpur institute of technology,
Nagpur, Maharashtra, India
4,5 Professor, Dept of Computer Science & Engineering, Nagpur institute of technology,
Nagpur, Maharashtra, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - The most important characteristic of a clipboard
manager is its ability to save time. Clipboard managers allow
users to store a history of previously copied content such as
text, files, Rigid and images—whereas the built in Windows
Clipboard only allows for storage of one item at a time—thus
allowing for speedy access of such content. This comes in
especially handy when carrying out repetitive dataentrytasks
such as entering repeat formula as well as storing images in a
database for further processing. Other uses include storing
common sections of code (for programmers) and storing
online form information. Some of us routinely carry out such
repetitive tasks given our professions, habits or hobbies and
the ability to cut down on the monotony of switching backand
forth between desired content is a valuable asset. Users can
choose exactly how many clips they want to be stored in the
history. There is a choice of how many clips are storedbybeing
made immediately available on the popup menu and, how
many are stored out of sight but still remain in the program
cache. This is useful as not all of the clips need to be
immediately available for pasting and can be adjusted based
on the habits of users. Users can also make certain clips
permanently available and store them in different groups.
Basic cut and paste gets the job done, but if you're going for
speed and efficiency, you'll need a clipboard manger to keep
your copy-full strong. Keeping all the most frequentlyusedtext
snippets in the Windows clipboard does make sense.
Key Words: Clipboard, Clips, Clipboardmanager, Buffer,
Copy-Cut-Paste, Logs.
1. INTRODUCTION:
The clipboard is a software facility used for short-
term data storage and/or data transfer between documents
or applications, via copy and paste operations. It is most
commonly a part of a GUI environment and is usually
implemented as an anonymous, temporary data buffer that
can be accessed from most or all programs within the
environment via defined programming interfaces. A typical
application accesses clipboard functionalitybymappinguser
input (key bindings, menu selections, etc.) to these
interfaces.
The default Windows clipboard has two very obvious
limitations: it can store only one item at a time and it is
cleared every time the computer restarts. Clipboard
replacement utilitieswill notonly solvethoseproblems,they
will give you much more power over your clipboard.
These utilities provide a clipboard history and they come
with additional features such as built-in text editor,
additional information about the clip (date & time, origin,
user name), launch actions (such as Google search) and
more.
Because they replace such a basic system function,clipboard
managershave to be simple to use, but that dependson how
you use your computer. There is no one-size-fits-all when it
comes to clipboard managers, so I suggest you try some of
those freeware products for yourself and find the one that
suits you the best.
Here I came up with a list of specifications to evaluate
clipboard managers:
 Simple: Easy to setup and use. It should work as
intended right out of the box, without any tweaks.
 Reliable: It can handle everything the default
Windowsclipboard can handle. It should belighton
resources and fully compatible with the latest
versions of Windows.
 Accessible: Easy to use with cursor-only,keyboard-
only or a mix of both. It also needs a nice and clear
interface.
 Powerful and customizable: Provide extra
featuresfor advanced userswho needmoreoptions
than simply copy, cut and paste.
2. Methodology:
Modern GUIs often provide a clipboard manager
which supports multiple cut and paste transactions. In this
model the clipboard is treated as a stack or scrap book, with
new cuts and copies being placed on top of the list of recent
transactions. The standard paste operation copies the most
recent transaction, while specialized pastes provide access
to the other stored transactions. These managers generally
also provide a window that displays the transaction history
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 143
and allows the user to select earlier copies,editthem,change
their format and even search amongst them.
In Windows Clipboard Utility like Clip diary in which it
maintain the history of copied files and when user want to
paste any files from diary of the copied files firstly you need
to open the diary by pressing the key ctrl+D thenitwillshow
you all copied files.
So here I am going to overcome this limitations by providing
Buffer for copy data whatever the user copied data it stored
into a buffer with additional features such as built-in text
editor, additional information about the clip(date & time,
origin, user name), launch actions (such as
Fig 1.1 clipboard operations
3. Literature Survey:
In human-computer interaction, cut and paste and copyand
paste are related commands that offer a user-
interface interaction technique for transferring
text, data, files or objects from a sourcetoadestination.Most
ubiquitously, users require the ability to cut and paste
sections of plain text. The cut command removes
the selected data from its original position, while
the copy command creates a duplicate; in both cases the
selected data is placed in a clipboard. The data in the
clipboard is later inserted in the position where
the paste command is issued.
This interaction technique has close associations with
related techniques in graphical user interfaces that
use pointing devices such as a computermouse (by dragand
drop, for example).The capability to replicate information
with ease, changing it between contexts and applications,
involves privacy concerns because of the risks of disclosure
when handling sensitive information Terms
like cloning, copy forward, carry forward, or re-use refer to
the dissemination of such information through documents,
and may be subject to regulation by administrative bodies
The term "cut and paste" comesfrom the traditionalpractice
in manuscript-editing’s whereby people would literally cut
paragraphs from a page with scissors and physically paste
them onto another page. This practice remained standard
into the 1980s. Stationery stores formerly sold "editing
scissors" with blades long enough to cut
An 8½"-wide page. The advent of photocopiers made the
practice easier and more flexible.
The act of copying/transferring text from one part of a
computer-based document ("buffer") to a different location
within the same or different
The act of copying/transferring text from one part of a
computer-based document ("buffer") to a different location
within the same or different Computer-based documentwas
a part of the earliest on-line computer editors. As soon as
computer data entry moved from punch-cardsto onlinefiles
(in the mid/late 1960s) there were "commands" for
accomplishing this operation. This mechanism was often
used to transfer frequently-used commandsor text snippets
from additional buffers into the document, as was the case
with the QEDeditor.
The earliest editors, since they weredesignedfor"hardcopy"
terminal, provided keyboard commands copy "Terminals,
provided keyboard commands to delineate contiguous
regions of text, remove such regions, or move them to some
other location in the file. Since moving a region of text
required first removing it from its initial location and then
inserting it into its new location various schemes had to be
invented to allow for this multi-step process to be specified
by the user.
Often this was done by the provision of a 'move' command,
but some text editors required that the text be first put into
some temporary location for later retrieval/placement. In
1983, the Apple Lisa became the first text editing system to
call that temporary location "the clipboard".
4. Data Extraction Process by using Clipboard:
The below figure definesstagesrequired for extractingdata.
 First, clipboard can identify the relevant functions.
 Secondly, by according to its functions data can be
extracted from those functions.
 Then data retrieved is classified in differentformats
and if the required format is found in the clipboard
then it is appended.
 Finally the identified data is extracted and used
depending on applications.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 144
5. Implementation:
Using above classes and methods the data can be
obtained from the clipboard. [1] The below algorithmcanbe
used as the basic layout for the working of extraction.
Clipboard c; c=getSystemClipboard (); if (Data Flavor is
Available) Get data (Data Flavor);
e.g.
Clipboard c;
StringSelectioncnt= new String Selection (“Data”);
6. Analysis of problem:
Clipboard has very obvious different issues [3] firstly it
store one item at a time on clipboard memory if you had
copy another item it overwritten on previous item.
 If you turn off or rest art the system it clears
memory every time if in case you want previous
copied contents you will be miss that contents.
 Clipboard is a temporary storage [3] area for
information that enables applications to transfer
data or moved one place and plan to use
somewhere else.
 You can select text, graphics or anything and then
use the cut or copy commands to move your
selection to the clipboard whatever information is
copy is store on the clipboard memory, whereitwill
be stored until youuse the paste command toinsert
elsewhere.
 If you had copy another item it overwritten on
previous item.
7. Features
Features of Clipboard
 Multiple buffersand ability to combinesplitandrun
their contents.
 Choosing which buffer “cut or copy operations
should store data in”.
 Clipboard can save different types of data like
handling formatted text tabular data, data objects
media contents and URLs searching of saved data.
 Choosing which buffer (s) “paste “operations.
 Permanent storage for copy data.
 Need not concern about loss of data because data is
located on hard disk.
8. Limitations of Clipboard:
Copy operation does not copy all sub-folders when
undertaking very large partitions, of 400 GBormore. Firstly
it can store only one item at a time.
 Secondly it is erased every time the computer
restarts.
 Clipboard saves temporary data while operating
system is running. After that each shut down
process, the content of clipboard are removed for
maintaining efficiency of operating system.so that,
the users are unable to retrieve data of preceding
copied data.
 Windows clipboard cannot be used to process text
that contains null character.
9. Existing work:
 Clipboard has the mechanism of share the
information between the applications.[1]
 It first seemed in Windows 3.1, after that working
has greatly increased.
 After that copying more complex data than text to
the clipboard, Windows varieties available several
APIs which make extraction much more difficult.
 Dynamic data exchange (DDE) is very useful
method for extracting the data.
 In 1990, Microsoft windowsreleased object linking
and embedding (OLE) enabling compound files.
Compound files have most of the file in primary
format (for e.g. a Microsoft Word 2.2 Clipboard
classes and Methods: While there is a large amount
of documentation on how to use and access the
windows clipboard via application program
interfaces (APIs), [1] there is document on the
methods used other than APIs. Extending classes
like Clipboard we can access the data stored in the
clipboard using its different methods like as:
 GetSystemClipboard () is called to retrieve the
pointer to the clipboard data. This provides handle
to the or during drag and drop operation.
 Flavor Listeners() may be registered onaninstance
of the Clipboard properties.
 The Toolkit ass is the main class which is use to get
the system clipboard.
 A Data Flavor () provides Meta information about
data. Data Flavors is typically used to flavors are
classified those depending on file formats.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 145
 Data Flavor Available method is method to check
whether the data flavor of the data in the clipboard
is in the list of valid data flavors.
 Logger and clipboard manager which fulfils user
requirements with easy interface.
11. References:
[1]Ganesh N. Nadargi1, Zakir M. Shaikh2,”Identifying and
Extracting Data from Clipboard”, International Journal of
Computer Science and Information Technologies,Volume.6,
Issue 6, 2015, PP 2127-2129.
[2]Pratik R. Tambekar, T. R. Ravi,” Clipboard Logger-For
Windows Platform”, International Journal of Science and
Research (IJSR) Volume 3, Issue 12, December2014,PP732-
734.
[3]Pratik R. Tambekar, “Clipboard Organizer and Manager-
For Windows Platform” International Journal onRecentand
Innovation Trends in Computing and Communication ISSN:
2321-8169 Volume: 3 Issue 2, PP 383– 386.
[4]Mark Apperley, Dale Fletcher, Bill Rogers, “Breaking the
Copy/Paste Cycle: The StretchableSelectionTool”,Computer
Science Department, Waikato University Hamilton, New
Zealand, PP
[5] "Clipboard Operations",http://msdn.microsoft.Com/en-
us/library/ms649016 (VS. 85). aspx
[6]K. C. Lam, W. C. Lau, O. Yue "Hitchbot - Delivering
Malicious URLs via Social Hitch-hiking" published in IEEE
Globecom 2011 Proceedings.
[7]S. Li, S. Lv, X. Jia and Z. Shao "Application of Clipboard
Monitoring Technology in Graphic and Document
Information Security Protection System" published in Third
International Symposium on Intelligent Information
Technology and Security Informatics, IEEE 2010.
[8]K. T. Stolee, S. Elbaum, and G. Rothermel "Revealing the
Copy and Paste Habits of End Users" Symposium on Visual
Languages and Human-Centric Computing (VL/HCC) IEEE
2009.
[9]M. Wang and Z. Qui "Research of Anti-copyandPlagiarism
Monitoring System" First International Workshop on
Education Technology and Computer Science, IEEE 2009.
[10]"GoogleForum"https://groups.google.com/forum/#!topi
c/keepassdroid discuss/w1x6pFUSexw
[11]"MALWAREHELP.org"http://www.malwarehelp.
Org/malware-new-attack-hijacks-the-clipboard-2008.Html
[12]"Clipboards hijacked in web attack" http://news. bbc.
Co. uk/2/hi/technology/7567889. Stm
[13]"Clipboard Snooping Malware" http://www. InfoSec
Island. Com/blogview/22429-detecting-Window-Stations-
and-Clipboard-Monitoring-Malware-with-Volatility.

More Related Content

PDF
OPERATING SYSTEM AND ITS TYPES REPORT
PPTX
Os unit 3
PDF
ITFT_Device management in Operating System
PPTX
Operating system interview question
DOCX
Complete Operating System notes
PDF
Operating System
PPTX
Operating system concepts
OPERATING SYSTEM AND ITS TYPES REPORT
Os unit 3
ITFT_Device management in Operating System
Operating system interview question
Complete Operating System notes
Operating System
Operating system concepts

What's hot (19)

PPTX
Ch 7 io_management & disk scheduling
PPTX
Types of operating system
DOC
operating system lecture notes
PPTX
Presentation1
PPT
Advanced Operating System- Introduction
PPT
Basic os-concepts
PPTX
Os unit 2
PPTX
Process creation and termination In Operating System
PPTX
Os unit 3 , process management
PDF
SOLUTION MANUAL OF OPERATING SYSTEM CONCEPTS BY ABRAHAM SILBERSCHATZ, PETER B...
PDF
Os notes 1_5
PPT
Chapter 1: Introduction to Operating System
PDF
Operating System a Case Study
PPT
Operating systems1[1]
PDF
Unit 2 part 2(Process)
PPT
Operating systems types, spooling and buffering
PPTX
Mis unit iii by arnav
PPT
PPT
Operating System
Ch 7 io_management & disk scheduling
Types of operating system
operating system lecture notes
Presentation1
Advanced Operating System- Introduction
Basic os-concepts
Os unit 2
Process creation and termination In Operating System
Os unit 3 , process management
SOLUTION MANUAL OF OPERATING SYSTEM CONCEPTS BY ABRAHAM SILBERSCHATZ, PETER B...
Os notes 1_5
Chapter 1: Introduction to Operating System
Operating System a Case Study
Operating systems1[1]
Unit 2 part 2(Process)
Operating systems types, spooling and buffering
Mis unit iii by arnav
Operating System
Ad

Similar to IRJET-Clipboard Manager (20)

PDF
intro to OS
DOC
computer notes - Introduction to operating system
DOCX
Computers in management
PPTX
MYSQL DATABASE Operating System Part2 (1).pptx
PDF
PARKING ALLOTMENT SYSTEM PROJECT REPORT REPORT.
PPTX
1-Introduction.pptx computer Networking
PPT
PDF
Google File System
DOCX
MIS assignement
PDF
PDF
Linux-Based Data Acquisition and Processing On Palmtop Computer
PDF
Linux-Based Data Acquisition and Processing On Palmtop Computer
PDF
HiPEAC 2019 Tutorial - Maestro RTOS
PPT
Basics of Operating System
PDF
Operating Systems Structure1- Explain briefly why the objectives o.pdf
PPTX
UNIT 1FUNDAMENTALS OF OPERATING SYSTEMS.pptx
PDF
Library Management System using oracle database
PPTX
IT130 - U1L1.pptx
PDF
IETM Software: User (Operator, Maintainer)- Administrator & Super Admin/ Auth...
intro to OS
computer notes - Introduction to operating system
Computers in management
MYSQL DATABASE Operating System Part2 (1).pptx
PARKING ALLOTMENT SYSTEM PROJECT REPORT REPORT.
1-Introduction.pptx computer Networking
Google File System
MIS assignement
Linux-Based Data Acquisition and Processing On Palmtop Computer
Linux-Based Data Acquisition and Processing On Palmtop Computer
HiPEAC 2019 Tutorial - Maestro RTOS
Basics of Operating System
Operating Systems Structure1- Explain briefly why the objectives o.pdf
UNIT 1FUNDAMENTALS OF OPERATING SYSTEMS.pptx
Library Management System using oracle database
IT130 - U1L1.pptx
IETM Software: User (Operator, Maintainer)- Administrator & Super Admin/ Auth...
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PPTX
additive manufacturing of ss316l using mig welding
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PDF
Digital Logic Computer Design lecture notes
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
Structs to JSON How Go Powers REST APIs.pdf
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
Geodesy 1.pptx...............................................
PPTX
Construction Project Organization Group 2.pptx
PPTX
Lesson 3_Tessellation.pptx finite Mathematics
PPTX
Sustainable Sites - Green Building Construction
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
additive manufacturing of ss316l using mig welding
UNIT-1 - COAL BASED THERMAL POWER PLANTS
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
UNIT 4 Total Quality Management .pptx
CYBER-CRIMES AND SECURITY A guide to understanding
Digital Logic Computer Design lecture notes
CH1 Production IntroductoryConcepts.pptx
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Structs to JSON How Go Powers REST APIs.pdf
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Geodesy 1.pptx...............................................
Construction Project Organization Group 2.pptx
Lesson 3_Tessellation.pptx finite Mathematics
Sustainable Sites - Green Building Construction
Embodied AI: Ushering in the Next Era of Intelligent Systems
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Operating System & Kernel Study Guide-1 - converted.pdf
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx

IRJET-Clipboard Manager

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 142 “Clipboard Manager” Ms. Kiran Bahaniya1, Ms. Komal Dhote2, Ms. Laxmi ogale3, Prof. Ashish Palandurkar4, Prof. Mahvash Khan5 1,2,3 Students, Dept of Computer Science & Engineering, Nagpur institute of technology, Nagpur, Maharashtra, India 4,5 Professor, Dept of Computer Science & Engineering, Nagpur institute of technology, Nagpur, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - The most important characteristic of a clipboard manager is its ability to save time. Clipboard managers allow users to store a history of previously copied content such as text, files, Rigid and images—whereas the built in Windows Clipboard only allows for storage of one item at a time—thus allowing for speedy access of such content. This comes in especially handy when carrying out repetitive dataentrytasks such as entering repeat formula as well as storing images in a database for further processing. Other uses include storing common sections of code (for programmers) and storing online form information. Some of us routinely carry out such repetitive tasks given our professions, habits or hobbies and the ability to cut down on the monotony of switching backand forth between desired content is a valuable asset. Users can choose exactly how many clips they want to be stored in the history. There is a choice of how many clips are storedbybeing made immediately available on the popup menu and, how many are stored out of sight but still remain in the program cache. This is useful as not all of the clips need to be immediately available for pasting and can be adjusted based on the habits of users. Users can also make certain clips permanently available and store them in different groups. Basic cut and paste gets the job done, but if you're going for speed and efficiency, you'll need a clipboard manger to keep your copy-full strong. Keeping all the most frequentlyusedtext snippets in the Windows clipboard does make sense. Key Words: Clipboard, Clips, Clipboardmanager, Buffer, Copy-Cut-Paste, Logs. 1. INTRODUCTION: The clipboard is a software facility used for short- term data storage and/or data transfer between documents or applications, via copy and paste operations. It is most commonly a part of a GUI environment and is usually implemented as an anonymous, temporary data buffer that can be accessed from most or all programs within the environment via defined programming interfaces. A typical application accesses clipboard functionalitybymappinguser input (key bindings, menu selections, etc.) to these interfaces. The default Windows clipboard has two very obvious limitations: it can store only one item at a time and it is cleared every time the computer restarts. Clipboard replacement utilitieswill notonly solvethoseproblems,they will give you much more power over your clipboard. These utilities provide a clipboard history and they come with additional features such as built-in text editor, additional information about the clip (date & time, origin, user name), launch actions (such as Google search) and more. Because they replace such a basic system function,clipboard managershave to be simple to use, but that dependson how you use your computer. There is no one-size-fits-all when it comes to clipboard managers, so I suggest you try some of those freeware products for yourself and find the one that suits you the best. Here I came up with a list of specifications to evaluate clipboard managers:  Simple: Easy to setup and use. It should work as intended right out of the box, without any tweaks.  Reliable: It can handle everything the default Windowsclipboard can handle. It should belighton resources and fully compatible with the latest versions of Windows.  Accessible: Easy to use with cursor-only,keyboard- only or a mix of both. It also needs a nice and clear interface.  Powerful and customizable: Provide extra featuresfor advanced userswho needmoreoptions than simply copy, cut and paste. 2. Methodology: Modern GUIs often provide a clipboard manager which supports multiple cut and paste transactions. In this model the clipboard is treated as a stack or scrap book, with new cuts and copies being placed on top of the list of recent transactions. The standard paste operation copies the most recent transaction, while specialized pastes provide access to the other stored transactions. These managers generally also provide a window that displays the transaction history
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 143 and allows the user to select earlier copies,editthem,change their format and even search amongst them. In Windows Clipboard Utility like Clip diary in which it maintain the history of copied files and when user want to paste any files from diary of the copied files firstly you need to open the diary by pressing the key ctrl+D thenitwillshow you all copied files. So here I am going to overcome this limitations by providing Buffer for copy data whatever the user copied data it stored into a buffer with additional features such as built-in text editor, additional information about the clip(date & time, origin, user name), launch actions (such as Fig 1.1 clipboard operations 3. Literature Survey: In human-computer interaction, cut and paste and copyand paste are related commands that offer a user- interface interaction technique for transferring text, data, files or objects from a sourcetoadestination.Most ubiquitously, users require the ability to cut and paste sections of plain text. The cut command removes the selected data from its original position, while the copy command creates a duplicate; in both cases the selected data is placed in a clipboard. The data in the clipboard is later inserted in the position where the paste command is issued. This interaction technique has close associations with related techniques in graphical user interfaces that use pointing devices such as a computermouse (by dragand drop, for example).The capability to replicate information with ease, changing it between contexts and applications, involves privacy concerns because of the risks of disclosure when handling sensitive information Terms like cloning, copy forward, carry forward, or re-use refer to the dissemination of such information through documents, and may be subject to regulation by administrative bodies The term "cut and paste" comesfrom the traditionalpractice in manuscript-editing’s whereby people would literally cut paragraphs from a page with scissors and physically paste them onto another page. This practice remained standard into the 1980s. Stationery stores formerly sold "editing scissors" with blades long enough to cut An 8½"-wide page. The advent of photocopiers made the practice easier and more flexible. The act of copying/transferring text from one part of a computer-based document ("buffer") to a different location within the same or different The act of copying/transferring text from one part of a computer-based document ("buffer") to a different location within the same or different Computer-based documentwas a part of the earliest on-line computer editors. As soon as computer data entry moved from punch-cardsto onlinefiles (in the mid/late 1960s) there were "commands" for accomplishing this operation. This mechanism was often used to transfer frequently-used commandsor text snippets from additional buffers into the document, as was the case with the QEDeditor. The earliest editors, since they weredesignedfor"hardcopy" terminal, provided keyboard commands copy "Terminals, provided keyboard commands to delineate contiguous regions of text, remove such regions, or move them to some other location in the file. Since moving a region of text required first removing it from its initial location and then inserting it into its new location various schemes had to be invented to allow for this multi-step process to be specified by the user. Often this was done by the provision of a 'move' command, but some text editors required that the text be first put into some temporary location for later retrieval/placement. In 1983, the Apple Lisa became the first text editing system to call that temporary location "the clipboard". 4. Data Extraction Process by using Clipboard: The below figure definesstagesrequired for extractingdata.  First, clipboard can identify the relevant functions.  Secondly, by according to its functions data can be extracted from those functions.  Then data retrieved is classified in differentformats and if the required format is found in the clipboard then it is appended.  Finally the identified data is extracted and used depending on applications.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 144 5. Implementation: Using above classes and methods the data can be obtained from the clipboard. [1] The below algorithmcanbe used as the basic layout for the working of extraction. Clipboard c; c=getSystemClipboard (); if (Data Flavor is Available) Get data (Data Flavor); e.g. Clipboard c; StringSelectioncnt= new String Selection (“Data”); 6. Analysis of problem: Clipboard has very obvious different issues [3] firstly it store one item at a time on clipboard memory if you had copy another item it overwritten on previous item.  If you turn off or rest art the system it clears memory every time if in case you want previous copied contents you will be miss that contents.  Clipboard is a temporary storage [3] area for information that enables applications to transfer data or moved one place and plan to use somewhere else.  You can select text, graphics or anything and then use the cut or copy commands to move your selection to the clipboard whatever information is copy is store on the clipboard memory, whereitwill be stored until youuse the paste command toinsert elsewhere.  If you had copy another item it overwritten on previous item. 7. Features Features of Clipboard  Multiple buffersand ability to combinesplitandrun their contents.  Choosing which buffer “cut or copy operations should store data in”.  Clipboard can save different types of data like handling formatted text tabular data, data objects media contents and URLs searching of saved data.  Choosing which buffer (s) “paste “operations.  Permanent storage for copy data.  Need not concern about loss of data because data is located on hard disk. 8. Limitations of Clipboard: Copy operation does not copy all sub-folders when undertaking very large partitions, of 400 GBormore. Firstly it can store only one item at a time.  Secondly it is erased every time the computer restarts.  Clipboard saves temporary data while operating system is running. After that each shut down process, the content of clipboard are removed for maintaining efficiency of operating system.so that, the users are unable to retrieve data of preceding copied data.  Windows clipboard cannot be used to process text that contains null character. 9. Existing work:  Clipboard has the mechanism of share the information between the applications.[1]  It first seemed in Windows 3.1, after that working has greatly increased.  After that copying more complex data than text to the clipboard, Windows varieties available several APIs which make extraction much more difficult.  Dynamic data exchange (DDE) is very useful method for extracting the data.  In 1990, Microsoft windowsreleased object linking and embedding (OLE) enabling compound files. Compound files have most of the file in primary format (for e.g. a Microsoft Word 2.2 Clipboard classes and Methods: While there is a large amount of documentation on how to use and access the windows clipboard via application program interfaces (APIs), [1] there is document on the methods used other than APIs. Extending classes like Clipboard we can access the data stored in the clipboard using its different methods like as:  GetSystemClipboard () is called to retrieve the pointer to the clipboard data. This provides handle to the or during drag and drop operation.  Flavor Listeners() may be registered onaninstance of the Clipboard properties.  The Toolkit ass is the main class which is use to get the system clipboard.  A Data Flavor () provides Meta information about data. Data Flavors is typically used to flavors are classified those depending on file formats.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 145  Data Flavor Available method is method to check whether the data flavor of the data in the clipboard is in the list of valid data flavors.  Logger and clipboard manager which fulfils user requirements with easy interface. 11. References: [1]Ganesh N. Nadargi1, Zakir M. Shaikh2,”Identifying and Extracting Data from Clipboard”, International Journal of Computer Science and Information Technologies,Volume.6, Issue 6, 2015, PP 2127-2129. [2]Pratik R. Tambekar, T. R. Ravi,” Clipboard Logger-For Windows Platform”, International Journal of Science and Research (IJSR) Volume 3, Issue 12, December2014,PP732- 734. [3]Pratik R. Tambekar, “Clipboard Organizer and Manager- For Windows Platform” International Journal onRecentand Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 3 Issue 2, PP 383– 386. [4]Mark Apperley, Dale Fletcher, Bill Rogers, “Breaking the Copy/Paste Cycle: The StretchableSelectionTool”,Computer Science Department, Waikato University Hamilton, New Zealand, PP [5] "Clipboard Operations",http://msdn.microsoft.Com/en- us/library/ms649016 (VS. 85). aspx [6]K. C. Lam, W. C. Lau, O. Yue "Hitchbot - Delivering Malicious URLs via Social Hitch-hiking" published in IEEE Globecom 2011 Proceedings. [7]S. Li, S. Lv, X. Jia and Z. Shao "Application of Clipboard Monitoring Technology in Graphic and Document Information Security Protection System" published in Third International Symposium on Intelligent Information Technology and Security Informatics, IEEE 2010. [8]K. T. Stolee, S. Elbaum, and G. Rothermel "Revealing the Copy and Paste Habits of End Users" Symposium on Visual Languages and Human-Centric Computing (VL/HCC) IEEE 2009. [9]M. Wang and Z. Qui "Research of Anti-copyandPlagiarism Monitoring System" First International Workshop on Education Technology and Computer Science, IEEE 2009. [10]"GoogleForum"https://groups.google.com/forum/#!topi c/keepassdroid discuss/w1x6pFUSexw [11]"MALWAREHELP.org"http://www.malwarehelp. Org/malware-new-attack-hijacks-the-clipboard-2008.Html [12]"Clipboards hijacked in web attack" http://news. bbc. Co. uk/2/hi/technology/7567889. Stm [13]"Clipboard Snooping Malware" http://www. InfoSec Island. Com/blogview/22429-detecting-Window-Stations- and-Clipboard-Monitoring-Malware-with-Volatility.