4. What is a file..?
A computer file is a block of arbitrary
information, or resource for storing
information
A file is durable in the sense that it
remains available for programs to use
after the current program has finished.
File types are differ by its extension.
6/4/2013 MAHFUZ 4
5. Why file security..?
Personal data including files and
accounts or one‟s company's important
information might leak out without prior
permission.
File security is a branch of computer
technology known as information
security as applied to computers and
networks.
The basic objective of file security is
protection of information and property
from any unauthorized access.
6/4/2013 MAHFUZ 5
6. Security software
To secure one‟s personal data, security
s/w came into light.
Security software is software whose
main task is encryption and decryption
of data.
6/4/2013 MAHFUZ 6
"Safety First" is "Safety Always."
-Charles M. Hayes, the ex-
president on the Grand Trunk Pacific
Railway.
7. Encryption software executes an
algorithm that is designed to encrypt
computer data in such a way that it
cannot be recovered without access to
the key.
The purpose of encryption is to
prevent third parties from recovering
the original information.
6/4/2013 MAHFUZ 7
8. Encryption can be applied to data in
many ways. Common categories are:
Disk encryption software
File/folder encryption
Database encryption
Communication encryption software
My project is to work with File
security or File encryption.
6/4/2013 MAHFUZ 8
9. Voice as „password‟
In early days, people used to use only
text passwords for their systems, that
has to be typed from their keyboards.
6/4/2013 MAHFUZ 9
Fashion is not something that exists in
dresses only. Fashion is in the sky, in the
street, fashion has to do with ideas, the way
we live, what is happening.
-Coco Chanel, was a French fashion
designer.
10. But now many things can be used for
password.
Voice also can be used as password
When the use of keyboard is not
convenient or the use of smart card
alone is not reliable.
When one need to modernize security
infra-structure.
When inbuilt microphone and speaker
are available on most modern computer.
The technique of using voice
password is known as voice
recognition.
6/4/2013 MAHFUZ 10
11. A confusion..!!
Voice recognition Vs Speech
recognition..
6/4/2013 MAHFUZ 11
A perfection of means, and confusion of
aims, seems to be our main problem.
-Albert Einstein
12. Voice recognition (recognizing who
is speaking) and Speech recognition
(recognizing what is being said).
Voice recognition is the identification
of the person who is speaking by
characteristics of their voices (voice
biometrics).
Speech Recognition is technology
that can translate spoken words into
text.
6/4/2013 MAHFUZ 12
13. Voice recognition is also known as
Speaker recognition.
Voice recognition has a history dating
back some four decades and uses the
acoustic features of speech that have
been found to differ between
individuals.
These acoustic patterns reflect both
anatomy (e.g., size and shape of the
throat and mouth) and learned
behavioural patterns (e.g., voice pitch,
speaking style).
6/4/2013 MAHFUZ 13
14. Why voice recognition and how it
works..?
All of our voices are uniquely different
(including twins) and cannot be exactly
duplicated.
Voice password is an intelligent system
which can differentiate a person from
another by recognizing vocal identities
of a person.
Voice is made up of two components:
A physiological component (the voice
tract) and a behavioural component
(the pattern).
6/4/2013 MAHFUZ 14
15. In this technology in which the words or
phrases spoken by the humans are
converted into electrical signals and these
signals are transformed into coding
patterns.
Then these coding patterns are being used
to access the data.
Several steps should be carried out to
perform this process. The first step is for
the user to speak in the microphone.
The electrical signal from the microphone is
digitized by from "Analog-to-Digital", and is
stored in the memory.
This technique is a close analogy to the
traditional command inputs from the
keyboard.
6/4/2013 MAHFUZ 15
16. A voice recognition system has two
phases: Enrolment and verification.
During enrolment, the speaker's voice
is recorded and typically a number of
features are extracted to form a voice
print, template or model.
In the verification phase, a voice sample
or utterance is compared against a
previously created voiceprint.
6/4/2013 MAHFUZ 16
18. There are lots of “voice recognition”
and “file locker” exists individually.
But there are limited “file lockers
which uses “voice recognition”.
6/4/2013 MAHFUZ 18
One such system is
VoicePass PC Security Lock is build for
Windows PC.
19. Customer can select any word from
any language between 3-12 letters
long.
No more complex
passwords, usernames or security
questions to remember.
6/4/2013 MAHFUZ 19
Released date: July 20, 2011
Price: $9.99 to buy
Operating system: Windows NT/2000/XP/2003
20. PROPOSED SYSTEM
The proposed system is for academic
propose but it can be use by any
people.
FEATURES
1.User friendly.
2.Identification.
3.Near real-time approach
6/4/2013 MAHFUZ 20
The secret to discovery is to never believe
existing facts.
-Bryant H. McGill, American author.
21. SURAKSHA: SECURE
YOUR FILES..
6/4/2013 MAHFUZ 21
Proper names are poetry in the raw. Like
all poetry they are untranslatable.
-W.H. Auden, Anglo-American poet.
23. The main goal of Suraksha is
Identity management.
Voice biometric has provided an
alternative to other techniques in the
area of identity management.
This is particularly important in the
situation where some people may not
want to buy other H/w as fingerprint
reader etc.
Voice biometric may consider as an
alternatives for handicap people for
the purpose of equal treatment or
even for enhanced security.
6/4/2013 MAHFUZ 23
24. There will be two phases in Suraksha
to secure a file.
1st voice password
2nd keyboard password
6/4/2013 MAHFUZ 24
While a user wants to lock a file,
he/she have to go through this two
phases.
During locking a file initially the user
have to give his voice password.
And then the user have to provide a
text password.
25. During unlocking a file, the user have
to give his voice as a input, if it
matches the voice, which is used
during lock the file then it will allow
the user to go to the next phase.
6/4/2013 MAHFUZ 25
Then the user have to give the text
password, if it matches then the
system will unlock the file.
26. Why two phases..?
Guarding by two is more secure.
If somehow anyone crack first
level, then he have to go through one
more level of password.
This gives more protection.
6/4/2013 MAHFUZ 26
27. Flow-chart
6/4/2013 MAHFUZ 27
start
end
Select a file to lock
Disable all the user privileges from that file
Encrypt the content of the file and save it
with another extension
Take voice
password
Take text
password
Flow-chart for storing and
locking
28. 6/4/2013 MAHFUZ 28
start
end
Select a file to unlock (with another extension)
Enable all the user privileges from that file
Decrypt the content of the file and save it with
original extension
Take voice
password
Ask for text
password
Compare with the
stored voice and check
matching probability is
>= 0.9
If matches
yes
yes
No
(3 times)
No
(3 times)
Flow-chart for authentication
and unlocking
29. Storing the audio(voice) and
audio file format
An audio file format is a file
format for storing digital audio
data on a computer system.
This data can be stored
uncompressed, or compressed to
reduce the file size.
6/4/2013 MAHFUZ 29
Audio manipulation is a black art.
-Unknown
30. There are three major groups of audio
file formats:
Uncompressed audio formats;
Formats with lossless compression.
Formats with lossy compression.
6/4/2013 MAHFUZ 30
In Suraksha I am using “.wav”
extension to save a voice.
.wav comes under Uncompressed audio
formats.
The Wave file format is Windows' native
file format for storing digital audio data.
31. Wav files are formed by a header part
and a data part.
As the header part includes binary
data with different characteristics, it
can be appropriate to read data of
different types.
6/4/2013 MAHFUZ 31
35. How to compare..!!
After storing the audio and lock the
file, to unlock, we have to compare
the newly recorded wav file with
previously stored wav file.
For that we have to apply Digital
signal processing on the both wav
files.
6/4/2013 MAHFUZ 35
36. Digital signal processing
Digital signal processing (DSP) is
the mathematical manipulation of an
information signal to modify or
improve it in some way.
With the increasing use of computers
the usage of and need for digital
signal processing has increased.
To use an analog signal on a
computer, it must be digitized from
analog-to-digital signal.
6/4/2013 MAHFUZ 36
37. The following diagram shows the
analog to digital conversion process.
The red line only matches the blue line
at discrete points and these are called
the sampling points.
It is very important to take enough
samples of the input so that it can be
faithfully represented.
6/4/2013 MAHFUZ 37
38. The goal of DSP is usually to
measure, filter and/or compress
continuous real-world analog signals.
The first step is usually to convert the
signal from an analog to a digital form.
Discrete Fourier transform (DFT) is a
specific kind of discrete transform, it
transforms one function into
another, which is called the frequency
domain representation, of the original
function (which is often a function in the
time domain).
In frequency domain, it is easy to
compare two voices, because, its has a
very low probability of mismatch of a
person‟s voice‟s frequency.
6/4/2013 MAHFUZ 38
39. DFT
The DFT requires an input function that is
discrete. Such inputs are often created by
sampling a continuous function, such as a
person's voice.
The discrete input function must also have
a limited (finite) duration, such as one
period of a periodic sequence or a
windowed segment of a longer sequence.
One big disadvantage of DFT is that it is
very time taking. Its time complexity is
O(n²).
So while using DFT for a large number will
take a very long time.
6/4/2013 MAHFUZ 39
40. Fast Fourier Transform
(FFT)
The Fast Fourier Transform (FFT) is an
efficient algorithm for calculating the
DFT. While it produces the same result
as the other approaches.
It is incredibly more efficient, often
reducing the computation time by
hundreds.
FFT can compute the same result in
only O(N log N) operations.
6/4/2013 MAHFUZ 40
41. This is a divide and conquer algorithm
that recursively breaks down a DFT of
any composite size N = N1N2 into
many smaller DFTs of sizes N1 and N2.
This divides the transform into two
pieces of size N/2 at each step.
The second step is to calculate the N
frequency spectra corresponding to
these N time domain signals.
Lastly, the N spectra are synthesized
into a single frequency spectrum.
6/4/2013 MAHFUZ 41
42. After converting to frequency domain
it forms a complex number.
6/4/2013 MAHFUZ 42
43. When to declare match..!!
After converting into frequency
domain, we have find the probability
of matching between the two files.
If finds that probability is equal to or
greater than 0.9, then we may say as
the two wav files are equal.
6/4/2013 MAHFUZ 43
44. How to lock a file..?
After taking both voice and text
password, the system will lock the file.
Encrypt the content of the file and will
change the extension to an another
extension.
Disable the user privileges
i.e., read, write etc from that file.
6/4/2013 MAHFUZ 44
45. How to unlock a file..?
During authentication, if both the voice
and text password matches, the
system will unlock the file.
Enable the user privileges for that file.
Decrypt the content of the file and
save it with original extension.
6/4/2013 MAHFUZ 45
46. FEASIBILITY STUDY
Technical feasibility:
Additional hardware is required for record a
voice.
6/4/2013 MAHFUZ 46
Economic feasibility:
Existing hardware and software will be
used so no additional expenditure will be
required.
49. CONCLUSION
Voice password usage example here for an
idea of where and how it can be used.
It's a good solution to protect internet or
online banking users from potential high-
tech interception.
This is important to protect users from
financial loss and misuse of personal data.
For the time being I am trying to
implement it in only “.txt” files.
6/4/2013 MAHFUZ 49