SlideShare ist ein Scribd-Unternehmen logo
1 von 52
SEMINAR FOR ANALYSIS PHASE
SYED MAHFUZUL MAZID
ROLL NO.: 27
MCA 5th SEMESTER
ST. ANTHONY’S COLLEGE,
SHILLONG6/4/2013 1
CONTENTS
INTRODUCTION
EXISTING SYSTEM
PROPOSED SYSTEM
FEASIBILITY STUDY
CONCLUSION
REFERENCES
6/4/2013 MAHFUZ 2
INTRODUCTION
6/4/2013 MAHFUZ 3
The brain is a commodity used to
fertilize ideas.
-Elbert Hubbard, an American
artist and philosopher.
What is a file..?
A computer file is a block of arbitrary
information, or resource for storing
information
A file is durable in the sense that it
remains available for programs to use
after the current program has finished.
File types are differ by its extension.
6/4/2013 MAHFUZ 4
Why file security..?
Personal data including files and
accounts or one‟s company's important
information might leak out without prior
permission.
File security is a branch of computer
technology known as information
security as applied to computers and
networks.
The basic objective of file security is
protection of information and property
from any unauthorized access.
6/4/2013 MAHFUZ 5
Security software
To secure one‟s personal data, security
s/w came into light.
Security software is software whose
main task is encryption and decryption
of data.
6/4/2013 MAHFUZ 6
"Safety First" is "Safety Always."
-Charles M. Hayes, the ex-
president on the Grand Trunk Pacific
Railway.
Encryption software executes an
algorithm that is designed to encrypt
computer data in such a way that it
cannot be recovered without access to
the key.
The purpose of encryption is to
prevent third parties from recovering
the original information.
6/4/2013 MAHFUZ 7
Encryption can be applied to data in
many ways. Common categories are:
 Disk encryption software
 File/folder encryption
 Database encryption
 Communication encryption software
My project is to work with File
security or File encryption.
6/4/2013 MAHFUZ 8
Voice as „password‟
In early days, people used to use only
text passwords for their systems, that
has to be typed from their keyboards.
6/4/2013 MAHFUZ 9
Fashion is not something that exists in
dresses only. Fashion is in the sky, in the
street, fashion has to do with ideas, the way
we live, what is happening.
-Coco Chanel, was a French fashion
designer.
But now many things can be used for
password.
Voice also can be used as password
 When the use of keyboard is not
convenient or the use of smart card
alone is not reliable.
 When one need to modernize security
infra-structure.
 When inbuilt microphone and speaker
are available on most modern computer.
The technique of using voice
password is known as voice
recognition.
6/4/2013 MAHFUZ 10
A confusion..!!
Voice recognition Vs Speech
recognition..
6/4/2013 MAHFUZ 11
A perfection of means, and confusion of
aims, seems to be our main problem.
-Albert Einstein
Voice recognition (recognizing who
is speaking) and Speech recognition
(recognizing what is being said).
Voice recognition is the identification
of the person who is speaking by
characteristics of their voices (voice
biometrics).
Speech Recognition is technology
that can translate spoken words into
text.
6/4/2013 MAHFUZ 12
Voice recognition is also known as
Speaker recognition.
Voice recognition has a history dating
back some four decades and uses the
acoustic features of speech that have
been found to differ between
individuals.
These acoustic patterns reflect both
anatomy (e.g., size and shape of the
throat and mouth) and learned
behavioural patterns (e.g., voice pitch,
speaking style).
6/4/2013 MAHFUZ 13
Why voice recognition and how it
works..?
All of our voices are uniquely different
(including twins) and cannot be exactly
duplicated.
Voice password is an intelligent system
which can differentiate a person from
another by recognizing vocal identities
of a person.
Voice is made up of two components:
A physiological component (the voice
tract) and a behavioural component
(the pattern).
6/4/2013 MAHFUZ 14
In this technology in which the words or
phrases spoken by the humans are
converted into electrical signals and these
signals are transformed into coding
patterns.
Then these coding patterns are being used
to access the data.
Several steps should be carried out to
perform this process. The first step is for
the user to speak in the microphone.
The electrical signal from the microphone is
digitized by from "Analog-to-Digital", and is
stored in the memory.
This technique is a close analogy to the
traditional command inputs from the
keyboard.
6/4/2013 MAHFUZ 15
A voice recognition system has two
phases: Enrolment and verification.
During enrolment, the speaker's voice
is recorded and typically a number of
features are extracted to form a voice
print, template or model.
In the verification phase, a voice sample
or utterance is compared against a
previously created voiceprint.
6/4/2013 MAHFUZ 16
EXISTING SYSTEM
6/4/2013 MAHFUZ 17
Be faithful to that which exists within this
world.
-Andre Gide, French author
There are lots of “voice recognition”
and “file locker” exists individually.
But there are limited “file lockers
which uses “voice recognition”.
6/4/2013 MAHFUZ 18
One such system is
VoicePass PC Security Lock is build for
Windows PC.
Customer can select any word from
any language between 3-12 letters
long.
No more complex
passwords, usernames or security
questions to remember.
6/4/2013 MAHFUZ 19
Released date: July 20, 2011
Price: $9.99 to buy
Operating system: Windows NT/2000/XP/2003
PROPOSED SYSTEM
The proposed system is for academic
propose but it can be use by any
people.
FEATURES
1.User friendly.
2.Identification.
3.Near real-time approach
6/4/2013 MAHFUZ 20
The secret to discovery is to never believe
existing facts.
-Bryant H. McGill, American author.
SURAKSHA: SECURE
YOUR FILES..
6/4/2013 MAHFUZ 21
Proper names are poetry in the raw. Like
all poetry they are untranslatable.
-W.H. Auden, Anglo-American poet.
6/4/2013 MAHFUZ 22
Advertising is a bit like playing make-
believe.
-Hartman Jule,
The main goal of Suraksha is
Identity management.
Voice biometric has provided an
alternative to other techniques in the
area of identity management.
This is particularly important in the
situation where some people may not
want to buy other H/w as fingerprint
reader etc.
Voice biometric may consider as an
alternatives for handicap people for
the purpose of equal treatment or
even for enhanced security.
6/4/2013 MAHFUZ 23
There will be two phases in Suraksha
to secure a file.
1st voice password
2nd keyboard password
6/4/2013 MAHFUZ 24
While a user wants to lock a file,
he/she have to go through this two
phases.
During locking a file initially the user
have to give his voice password.
And then the user have to provide a
text password.
During unlocking a file, the user have
to give his voice as a input, if it
matches the voice, which is used
during lock the file then it will allow
the user to go to the next phase.
6/4/2013 MAHFUZ 25
Then the user have to give the text
password, if it matches then the
system will unlock the file.
Why two phases..?
Guarding by two is more secure.
If somehow anyone crack first
level, then he have to go through one
more level of password.
This gives more protection.
6/4/2013 MAHFUZ 26
Flow-chart
6/4/2013 MAHFUZ 27
start
end
Select a file to lock
Disable all the user privileges from that file
Encrypt the content of the file and save it
with another extension
Take voice
password
Take text
password
Flow-chart for storing and
locking
6/4/2013 MAHFUZ 28
start
end
Select a file to unlock (with another extension)
Enable all the user privileges from that file
Decrypt the content of the file and save it with
original extension
Take voice
password
Ask for text
password
Compare with the
stored voice and check
matching probability is
>= 0.9
If matches
yes
yes
No
(3 times)
No
(3 times)
Flow-chart for authentication
and unlocking
Storing the audio(voice) and
audio file format
An audio file format is a file
format for storing digital audio
data on a computer system.
This data can be stored
uncompressed, or compressed to
reduce the file size.
6/4/2013 MAHFUZ 29
Audio manipulation is a black art.
-Unknown
There are three major groups of audio
file formats:
 Uncompressed audio formats;
 Formats with lossless compression.
 Formats with lossy compression.
6/4/2013 MAHFUZ 30
In Suraksha I am using “.wav”
extension to save a voice.
.wav comes under Uncompressed audio
formats.
The Wave file format is Windows' native
file format for storing digital audio data.
Wav files are formed by a header part
and a data part.
As the header part includes binary
data with different characteristics, it
can be appropriate to read data of
different types.
6/4/2013 MAHFUZ 31
6/4/2013 MAHFUZ 32
An example how a wave file is stored:
52 49 46 46 24 08 00 00 57 41 56
45 66 6d 74 20 10 00 00 00 01 00
02 00 22 56 00 00 88 58 01 00 04
00 10 00 64 61 74 61 00 08 00 00
00 00 00 00 24 17 1e f3 3c 13 3c
14 16 f9 18 f9 34 e7 23 a6 3c f2 24
f2 11 ce 1a 0d
6/4/2013 MAHFUZ 33
6/4/2013 MAHFUZ 34
How to compare..!!
After storing the audio and lock the
file, to unlock, we have to compare
the newly recorded wav file with
previously stored wav file.
For that we have to apply Digital
signal processing on the both wav
files.
6/4/2013 MAHFUZ 35
Digital signal processing
Digital signal processing (DSP) is
the mathematical manipulation of an
information signal to modify or
improve it in some way.
With the increasing use of computers
the usage of and need for digital
signal processing has increased.
To use an analog signal on a
computer, it must be digitized from
analog-to-digital signal.
6/4/2013 MAHFUZ 36
The following diagram shows the
analog to digital conversion process.
The red line only matches the blue line
at discrete points and these are called
the sampling points.
It is very important to take enough
samples of the input so that it can be
faithfully represented.
6/4/2013 MAHFUZ 37
The goal of DSP is usually to
measure, filter and/or compress
continuous real-world analog signals.
The first step is usually to convert the
signal from an analog to a digital form.
Discrete Fourier transform (DFT) is a
specific kind of discrete transform, it
transforms one function into
another, which is called the frequency
domain representation, of the original
function (which is often a function in the
time domain).
In frequency domain, it is easy to
compare two voices, because, its has a
very low probability of mismatch of a
person‟s voice‟s frequency.
6/4/2013 MAHFUZ 38
DFT
The DFT requires an input function that is
discrete. Such inputs are often created by
sampling a continuous function, such as a
person's voice.
The discrete input function must also have
a limited (finite) duration, such as one
period of a periodic sequence or a
windowed segment of a longer sequence.
One big disadvantage of DFT is that it is
very time taking. Its time complexity is
O(n²).
So while using DFT for a large number will
take a very long time.
6/4/2013 MAHFUZ 39
Fast Fourier Transform
(FFT)
The Fast Fourier Transform (FFT) is an
efficient algorithm for calculating the
DFT. While it produces the same result
as the other approaches.
It is incredibly more efficient, often
reducing the computation time by
hundreds.
FFT can compute the same result in
only O(N log N) operations.
6/4/2013 MAHFUZ 40
This is a divide and conquer algorithm
that recursively breaks down a DFT of
any composite size N = N1N2 into
many smaller DFTs of sizes N1 and N2.
This divides the transform into two
pieces of size N/2 at each step.
The second step is to calculate the N
frequency spectra corresponding to
these N time domain signals.
Lastly, the N spectra are synthesized
into a single frequency spectrum.
6/4/2013 MAHFUZ 41
After converting to frequency domain
it forms a complex number.
6/4/2013 MAHFUZ 42
When to declare match..!!
After converting into frequency
domain, we have find the probability
of matching between the two files.
If finds that probability is equal to or
greater than 0.9, then we may say as
the two wav files are equal.
6/4/2013 MAHFUZ 43
How to lock a file..?
After taking both voice and text
password, the system will lock the file.
Encrypt the content of the file and will
change the extension to an another
extension.
Disable the user privileges
i.e., read, write etc from that file.
6/4/2013 MAHFUZ 44
How to unlock a file..?
During authentication, if both the voice
and text password matches, the
system will unlock the file.
Enable the user privileges for that file.
Decrypt the content of the file and
save it with original extension.
6/4/2013 MAHFUZ 45
FEASIBILITY STUDY
Technical feasibility:
Additional hardware is required for record a
voice.
6/4/2013 MAHFUZ 46
Economic feasibility:
Existing hardware and software will be
used so no additional expenditure will be
required.
System requirements
Hardware requirements:
Intel Pentium, 2.0 GHz
6/4/2013 MAHFUZ 47
512MB RAM
Key-board
Monitor
Microphone
Mouse
Software requirements:
Windows O/S
6/4/2013 MAHFUZ 48
CONCLUSION
Voice password usage example here for an
idea of where and how it can be used.
It's a good solution to protect internet or
online banking users from potential high-
tech interception.
This is important to protect users from
financial loss and misuse of personal data.
For the time being I am trying to
implement it in only “.txt” files.
6/4/2013 MAHFUZ 49
6/4/2013 MAHFUZ 50
True knowledge exists in knowing that
you know nothing.
-Socrates
REFERENCES
www.quotegarden.com
www.wikipedia.org
msdn.microsoft.com
www.basic-signalprocessing.com
www.superuser.com
www.sonicspot.com
www.stackoverflow.com
www.numerex.co.uk
www.brainyquotes.com
www.binary-universe.de
Voice Recognition Algorithms using Mel Frequency
Cepstral Coefficient (MFCC) and Dynamic Time
Warping (DTW) Techniques -Lindasalwa Muda, Mumtaj
Begam and I. Elamvazuthi
6/4/2013 MAHFUZ 51
THANKS
6/4/2013 MAHFUZ 52

Weitere ähnliche Inhalte

Ähnlich wie Seminar analysis Surakshaz

Data Security Using Audio Steganography
Data Security Using Audio SteganographyData Security Using Audio Steganography
Data Security Using Audio SteganographyRajan Yadav
 
Smartphone and tablet apps for people with disabilities
Smartphone and tablet apps for people with disabilities Smartphone and tablet apps for people with disabilities
Smartphone and tablet apps for people with disabilities jemsshep07
 
Artificial Intelligence for Speech Recognition
Artificial Intelligence for Speech RecognitionArtificial Intelligence for Speech Recognition
Artificial Intelligence for Speech RecognitionRHIMRJ Journal
 
Enhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyEnhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyIOSR Journals
 
AI for voice recognition.pptx
AI for voice recognition.pptxAI for voice recognition.pptx
AI for voice recognition.pptxJhalakDashora
 
Procedia Computer Science 94 ( 2016 ) 295 – 301 Avail.docx
 Procedia Computer Science   94  ( 2016 )  295 – 301 Avail.docx Procedia Computer Science   94  ( 2016 )  295 – 301 Avail.docx
Procedia Computer Science 94 ( 2016 ) 295 – 301 Avail.docxaryan532920
 
ResearchPaperITDF2435
ResearchPaperITDF2435ResearchPaperITDF2435
ResearchPaperITDF2435Manuel Garza
 
(In)security in Open Source
(In)security in Open Source(In)security in Open Source
(In)security in Open SourceShane Coughlan
 
Image Steganography Techniques: An Overview
Image Steganography Techniques: An OverviewImage Steganography Techniques: An Overview
Image Steganography Techniques: An OverviewCSCJournals
 
Forensic and Automatic Speaker Recognition System
Forensic and Automatic Speaker Recognition System Forensic and Automatic Speaker Recognition System
Forensic and Automatic Speaker Recognition System IJECEIAES
 
Staying Safe - Overview of FREE Encryption Tools
Staying Safe - Overview of FREE Encryption ToolsStaying Safe - Overview of FREE Encryption Tools
Staying Safe - Overview of FREE Encryption ToolsMicky Metts
 
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...iosrjce
 

Ähnlich wie Seminar analysis Surakshaz (20)

Data Security Using Audio Steganography
Data Security Using Audio SteganographyData Security Using Audio Steganography
Data Security Using Audio Steganography
 
Smartphone and tablet apps for people with disabilities
Smartphone and tablet apps for people with disabilities Smartphone and tablet apps for people with disabilities
Smartphone and tablet apps for people with disabilities
 
Artificial Intelligence for Speech Recognition
Artificial Intelligence for Speech RecognitionArtificial Intelligence for Speech Recognition
Artificial Intelligence for Speech Recognition
 
Enhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyEnhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio Steganography
 
AI for voice recognition.pptx
AI for voice recognition.pptxAI for voice recognition.pptx
AI for voice recognition.pptx
 
Procedia Computer Science 94 ( 2016 ) 295 – 301 Avail.docx
 Procedia Computer Science   94  ( 2016 )  295 – 301 Avail.docx Procedia Computer Science   94  ( 2016 )  295 – 301 Avail.docx
Procedia Computer Science 94 ( 2016 ) 295 – 301 Avail.docx
 
ResearchPaperITDF2435
ResearchPaperITDF2435ResearchPaperITDF2435
ResearchPaperITDF2435
 
(In)security in Open Source
(In)security in Open Source(In)security in Open Source
(In)security in Open Source
 
DakshSemwalcsA38
DakshSemwalcsA38DakshSemwalcsA38
DakshSemwalcsA38
 
Image Steganography Techniques: An Overview
Image Steganography Techniques: An OverviewImage Steganography Techniques: An Overview
Image Steganography Techniques: An Overview
 
Foss Presentation
Foss PresentationFoss Presentation
Foss Presentation
 
P0460594100
P0460594100P0460594100
P0460594100
 
COLOUR LOCK
COLOUR LOCKCOLOUR LOCK
COLOUR LOCK
 
Forensic and Automatic Speaker Recognition System
Forensic and Automatic Speaker Recognition System Forensic and Automatic Speaker Recognition System
Forensic and Automatic Speaker Recognition System
 
Ijsrp p8748
Ijsrp p8748Ijsrp p8748
Ijsrp p8748
 
Staying Safe - Overview of FREE Encryption Tools
Staying Safe - Overview of FREE Encryption ToolsStaying Safe - Overview of FREE Encryption Tools
Staying Safe - Overview of FREE Encryption Tools
 
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
 
F017253244
F017253244F017253244
F017253244
 
Memory devices
Memory devicesMemory devices
Memory devices
 
INTRODUCTION
INTRODUCTIONINTRODUCTION
INTRODUCTION
 

Kürzlich hochgeladen

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 

Kürzlich hochgeladen (20)

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 

Seminar analysis Surakshaz

  • 1. SEMINAR FOR ANALYSIS PHASE SYED MAHFUZUL MAZID ROLL NO.: 27 MCA 5th SEMESTER ST. ANTHONY’S COLLEGE, SHILLONG6/4/2013 1
  • 2. CONTENTS INTRODUCTION EXISTING SYSTEM PROPOSED SYSTEM FEASIBILITY STUDY CONCLUSION REFERENCES 6/4/2013 MAHFUZ 2
  • 3. INTRODUCTION 6/4/2013 MAHFUZ 3 The brain is a commodity used to fertilize ideas. -Elbert Hubbard, an American artist and philosopher.
  • 4. What is a file..? A computer file is a block of arbitrary information, or resource for storing information A file is durable in the sense that it remains available for programs to use after the current program has finished. File types are differ by its extension. 6/4/2013 MAHFUZ 4
  • 5. Why file security..? Personal data including files and accounts or one‟s company's important information might leak out without prior permission. File security is a branch of computer technology known as information security as applied to computers and networks. The basic objective of file security is protection of information and property from any unauthorized access. 6/4/2013 MAHFUZ 5
  • 6. Security software To secure one‟s personal data, security s/w came into light. Security software is software whose main task is encryption and decryption of data. 6/4/2013 MAHFUZ 6 "Safety First" is "Safety Always." -Charles M. Hayes, the ex- president on the Grand Trunk Pacific Railway.
  • 7. Encryption software executes an algorithm that is designed to encrypt computer data in such a way that it cannot be recovered without access to the key. The purpose of encryption is to prevent third parties from recovering the original information. 6/4/2013 MAHFUZ 7
  • 8. Encryption can be applied to data in many ways. Common categories are:  Disk encryption software  File/folder encryption  Database encryption  Communication encryption software My project is to work with File security or File encryption. 6/4/2013 MAHFUZ 8
  • 9. Voice as „password‟ In early days, people used to use only text passwords for their systems, that has to be typed from their keyboards. 6/4/2013 MAHFUZ 9 Fashion is not something that exists in dresses only. Fashion is in the sky, in the street, fashion has to do with ideas, the way we live, what is happening. -Coco Chanel, was a French fashion designer.
  • 10. But now many things can be used for password. Voice also can be used as password  When the use of keyboard is not convenient or the use of smart card alone is not reliable.  When one need to modernize security infra-structure.  When inbuilt microphone and speaker are available on most modern computer. The technique of using voice password is known as voice recognition. 6/4/2013 MAHFUZ 10
  • 11. A confusion..!! Voice recognition Vs Speech recognition.. 6/4/2013 MAHFUZ 11 A perfection of means, and confusion of aims, seems to be our main problem. -Albert Einstein
  • 12. Voice recognition (recognizing who is speaking) and Speech recognition (recognizing what is being said). Voice recognition is the identification of the person who is speaking by characteristics of their voices (voice biometrics). Speech Recognition is technology that can translate spoken words into text. 6/4/2013 MAHFUZ 12
  • 13. Voice recognition is also known as Speaker recognition. Voice recognition has a history dating back some four decades and uses the acoustic features of speech that have been found to differ between individuals. These acoustic patterns reflect both anatomy (e.g., size and shape of the throat and mouth) and learned behavioural patterns (e.g., voice pitch, speaking style). 6/4/2013 MAHFUZ 13
  • 14. Why voice recognition and how it works..? All of our voices are uniquely different (including twins) and cannot be exactly duplicated. Voice password is an intelligent system which can differentiate a person from another by recognizing vocal identities of a person. Voice is made up of two components: A physiological component (the voice tract) and a behavioural component (the pattern). 6/4/2013 MAHFUZ 14
  • 15. In this technology in which the words or phrases spoken by the humans are converted into electrical signals and these signals are transformed into coding patterns. Then these coding patterns are being used to access the data. Several steps should be carried out to perform this process. The first step is for the user to speak in the microphone. The electrical signal from the microphone is digitized by from "Analog-to-Digital", and is stored in the memory. This technique is a close analogy to the traditional command inputs from the keyboard. 6/4/2013 MAHFUZ 15
  • 16. A voice recognition system has two phases: Enrolment and verification. During enrolment, the speaker's voice is recorded and typically a number of features are extracted to form a voice print, template or model. In the verification phase, a voice sample or utterance is compared against a previously created voiceprint. 6/4/2013 MAHFUZ 16
  • 17. EXISTING SYSTEM 6/4/2013 MAHFUZ 17 Be faithful to that which exists within this world. -Andre Gide, French author
  • 18. There are lots of “voice recognition” and “file locker” exists individually. But there are limited “file lockers which uses “voice recognition”. 6/4/2013 MAHFUZ 18 One such system is VoicePass PC Security Lock is build for Windows PC.
  • 19. Customer can select any word from any language between 3-12 letters long. No more complex passwords, usernames or security questions to remember. 6/4/2013 MAHFUZ 19 Released date: July 20, 2011 Price: $9.99 to buy Operating system: Windows NT/2000/XP/2003
  • 20. PROPOSED SYSTEM The proposed system is for academic propose but it can be use by any people. FEATURES 1.User friendly. 2.Identification. 3.Near real-time approach 6/4/2013 MAHFUZ 20 The secret to discovery is to never believe existing facts. -Bryant H. McGill, American author.
  • 21. SURAKSHA: SECURE YOUR FILES.. 6/4/2013 MAHFUZ 21 Proper names are poetry in the raw. Like all poetry they are untranslatable. -W.H. Auden, Anglo-American poet.
  • 22. 6/4/2013 MAHFUZ 22 Advertising is a bit like playing make- believe. -Hartman Jule,
  • 23. The main goal of Suraksha is Identity management. Voice biometric has provided an alternative to other techniques in the area of identity management. This is particularly important in the situation where some people may not want to buy other H/w as fingerprint reader etc. Voice biometric may consider as an alternatives for handicap people for the purpose of equal treatment or even for enhanced security. 6/4/2013 MAHFUZ 23
  • 24. There will be two phases in Suraksha to secure a file. 1st voice password 2nd keyboard password 6/4/2013 MAHFUZ 24 While a user wants to lock a file, he/she have to go through this two phases. During locking a file initially the user have to give his voice password. And then the user have to provide a text password.
  • 25. During unlocking a file, the user have to give his voice as a input, if it matches the voice, which is used during lock the file then it will allow the user to go to the next phase. 6/4/2013 MAHFUZ 25 Then the user have to give the text password, if it matches then the system will unlock the file.
  • 26. Why two phases..? Guarding by two is more secure. If somehow anyone crack first level, then he have to go through one more level of password. This gives more protection. 6/4/2013 MAHFUZ 26
  • 27. Flow-chart 6/4/2013 MAHFUZ 27 start end Select a file to lock Disable all the user privileges from that file Encrypt the content of the file and save it with another extension Take voice password Take text password Flow-chart for storing and locking
  • 28. 6/4/2013 MAHFUZ 28 start end Select a file to unlock (with another extension) Enable all the user privileges from that file Decrypt the content of the file and save it with original extension Take voice password Ask for text password Compare with the stored voice and check matching probability is >= 0.9 If matches yes yes No (3 times) No (3 times) Flow-chart for authentication and unlocking
  • 29. Storing the audio(voice) and audio file format An audio file format is a file format for storing digital audio data on a computer system. This data can be stored uncompressed, or compressed to reduce the file size. 6/4/2013 MAHFUZ 29 Audio manipulation is a black art. -Unknown
  • 30. There are three major groups of audio file formats:  Uncompressed audio formats;  Formats with lossless compression.  Formats with lossy compression. 6/4/2013 MAHFUZ 30 In Suraksha I am using “.wav” extension to save a voice. .wav comes under Uncompressed audio formats. The Wave file format is Windows' native file format for storing digital audio data.
  • 31. Wav files are formed by a header part and a data part. As the header part includes binary data with different characteristics, it can be appropriate to read data of different types. 6/4/2013 MAHFUZ 31
  • 33. An example how a wave file is stored: 52 49 46 46 24 08 00 00 57 41 56 45 66 6d 74 20 10 00 00 00 01 00 02 00 22 56 00 00 88 58 01 00 04 00 10 00 64 61 74 61 00 08 00 00 00 00 00 00 24 17 1e f3 3c 13 3c 14 16 f9 18 f9 34 e7 23 a6 3c f2 24 f2 11 ce 1a 0d 6/4/2013 MAHFUZ 33
  • 35. How to compare..!! After storing the audio and lock the file, to unlock, we have to compare the newly recorded wav file with previously stored wav file. For that we have to apply Digital signal processing on the both wav files. 6/4/2013 MAHFUZ 35
  • 36. Digital signal processing Digital signal processing (DSP) is the mathematical manipulation of an information signal to modify or improve it in some way. With the increasing use of computers the usage of and need for digital signal processing has increased. To use an analog signal on a computer, it must be digitized from analog-to-digital signal. 6/4/2013 MAHFUZ 36
  • 37. The following diagram shows the analog to digital conversion process. The red line only matches the blue line at discrete points and these are called the sampling points. It is very important to take enough samples of the input so that it can be faithfully represented. 6/4/2013 MAHFUZ 37
  • 38. The goal of DSP is usually to measure, filter and/or compress continuous real-world analog signals. The first step is usually to convert the signal from an analog to a digital form. Discrete Fourier transform (DFT) is a specific kind of discrete transform, it transforms one function into another, which is called the frequency domain representation, of the original function (which is often a function in the time domain). In frequency domain, it is easy to compare two voices, because, its has a very low probability of mismatch of a person‟s voice‟s frequency. 6/4/2013 MAHFUZ 38
  • 39. DFT The DFT requires an input function that is discrete. Such inputs are often created by sampling a continuous function, such as a person's voice. The discrete input function must also have a limited (finite) duration, such as one period of a periodic sequence or a windowed segment of a longer sequence. One big disadvantage of DFT is that it is very time taking. Its time complexity is O(n²). So while using DFT for a large number will take a very long time. 6/4/2013 MAHFUZ 39
  • 40. Fast Fourier Transform (FFT) The Fast Fourier Transform (FFT) is an efficient algorithm for calculating the DFT. While it produces the same result as the other approaches. It is incredibly more efficient, often reducing the computation time by hundreds. FFT can compute the same result in only O(N log N) operations. 6/4/2013 MAHFUZ 40
  • 41. This is a divide and conquer algorithm that recursively breaks down a DFT of any composite size N = N1N2 into many smaller DFTs of sizes N1 and N2. This divides the transform into two pieces of size N/2 at each step. The second step is to calculate the N frequency spectra corresponding to these N time domain signals. Lastly, the N spectra are synthesized into a single frequency spectrum. 6/4/2013 MAHFUZ 41
  • 42. After converting to frequency domain it forms a complex number. 6/4/2013 MAHFUZ 42
  • 43. When to declare match..!! After converting into frequency domain, we have find the probability of matching between the two files. If finds that probability is equal to or greater than 0.9, then we may say as the two wav files are equal. 6/4/2013 MAHFUZ 43
  • 44. How to lock a file..? After taking both voice and text password, the system will lock the file. Encrypt the content of the file and will change the extension to an another extension. Disable the user privileges i.e., read, write etc from that file. 6/4/2013 MAHFUZ 44
  • 45. How to unlock a file..? During authentication, if both the voice and text password matches, the system will unlock the file. Enable the user privileges for that file. Decrypt the content of the file and save it with original extension. 6/4/2013 MAHFUZ 45
  • 46. FEASIBILITY STUDY Technical feasibility: Additional hardware is required for record a voice. 6/4/2013 MAHFUZ 46 Economic feasibility: Existing hardware and software will be used so no additional expenditure will be required.
  • 47. System requirements Hardware requirements: Intel Pentium, 2.0 GHz 6/4/2013 MAHFUZ 47 512MB RAM Key-board Monitor Microphone Mouse
  • 49. CONCLUSION Voice password usage example here for an idea of where and how it can be used. It's a good solution to protect internet or online banking users from potential high- tech interception. This is important to protect users from financial loss and misuse of personal data. For the time being I am trying to implement it in only “.txt” files. 6/4/2013 MAHFUZ 49
  • 50. 6/4/2013 MAHFUZ 50 True knowledge exists in knowing that you know nothing. -Socrates