View stunning SlideShares in full-screen with the new iOS app!Introducing SlideShare for AndroidExplore all your favorite topics in the SlideShare appGet the SlideShare app to Save for Later — even offline
View stunning SlideShares in full-screen with the new Android app!View stunning SlideShares in full-screen with the new iOS app!
INTRODUCTION6/4/2013 MAHFUZ 3The brain is a commodity used tofertilize ideas.-Elbert Hubbard, an Americanartist and philosopher.
What is a file..?A computer file is a block of arbitraryinformation, or resource for storinginformationA file is durable in the sense that itremains available for programs to useafter the current program has finished.File types are differ by its extension.6/4/2013 MAHFUZ 4
Why file security..?Personal data including files andaccounts or one‟s companys importantinformation might leak out without priorpermission.File security is a branch of computertechnology known as informationsecurity as applied to computers andnetworks.The basic objective of file security isprotection of information and propertyfrom any unauthorized access.6/4/2013 MAHFUZ 5
Security softwareTo secure one‟s personal data, securitys/w came into light.Security software is software whosemain task is encryption and decryptionof data.6/4/2013 MAHFUZ 6"Safety First" is "Safety Always."-Charles M. Hayes, the ex-president on the Grand Trunk PacificRailway.
Encryption software executes analgorithm that is designed to encryptcomputer data in such a way that itcannot be recovered without access tothe key.The purpose of encryption is toprevent third parties from recoveringthe original information.6/4/2013 MAHFUZ 7
Encryption can be applied to data inmany ways. Common categories are: Disk encryption software File/folder encryption Database encryption Communication encryption softwareMy project is to work with Filesecurity or File encryption.6/4/2013 MAHFUZ 8
Voice as „password‟In early days, people used to use onlytext passwords for their systems, thathas to be typed from their keyboards.6/4/2013 MAHFUZ 9Fashion is not something that exists indresses only. Fashion is in the sky, in thestreet, fashion has to do with ideas, the waywe live, what is happening.-Coco Chanel, was a French fashiondesigner.
But now many things can be used forpassword.Voice also can be used as password When the use of keyboard is notconvenient or the use of smart cardalone is not reliable. When one need to modernize securityinfra-structure. When inbuilt microphone and speakerare available on most modern computer.The technique of using voicepassword is known as voicerecognition.6/4/2013 MAHFUZ 10
A confusion..!!Voice recognition Vs Speechrecognition..6/4/2013 MAHFUZ 11A perfection of means, and confusion ofaims, seems to be our main problem.-Albert Einstein
Voice recognition (recognizing whois speaking) and Speech recognition(recognizing what is being said).Voice recognition is the identificationof the person who is speaking bycharacteristics of their voices (voicebiometrics).Speech Recognition is technologythat can translate spoken words intotext.6/4/2013 MAHFUZ 12
Voice recognition is also known asSpeaker recognition.Voice recognition has a history datingback some four decades and uses theacoustic features of speech that havebeen found to differ betweenindividuals.These acoustic patterns reflect bothanatomy (e.g., size and shape of thethroat and mouth) and learnedbehavioural patterns (e.g., voice pitch,speaking style).6/4/2013 MAHFUZ 13
Why voice recognition and how itworks..?All of our voices are uniquely different(including twins) and cannot be exactlyduplicated.Voice password is an intelligent systemwhich can differentiate a person fromanother by recognizing vocal identitiesof a person.Voice is made up of two components:A physiological component (the voicetract) and a behavioural component(the pattern).6/4/2013 MAHFUZ 14
In this technology in which the words orphrases spoken by the humans areconverted into electrical signals and thesesignals are transformed into codingpatterns.Then these coding patterns are being usedto access the data.Several steps should be carried out toperform this process. The first step is forthe user to speak in the microphone.The electrical signal from the microphone isdigitized by from "Analog-to-Digital", and isstored in the memory.This technique is a close analogy to thetraditional command inputs from thekeyboard.6/4/2013 MAHFUZ 15
A voice recognition system has twophases: Enrolment and verification.During enrolment, the speakers voiceis recorded and typically a number offeatures are extracted to form a voiceprint, template or model.In the verification phase, a voice sampleor utterance is compared against apreviously created voiceprint.6/4/2013 MAHFUZ 16
EXISTING SYSTEM6/4/2013 MAHFUZ 17Be faithful to that which exists within thisworld.-Andre Gide, French author
There are lots of “voice recognition”and “file locker” exists individually.But there are limited “file lockerswhich uses “voice recognition”.6/4/2013 MAHFUZ 18One such system isVoicePass PC Security Lock is build forWindows PC.
Customer can select any word fromany language between 3-12 letterslong.No more complexpasswords, usernames or securityquestions to remember.6/4/2013 MAHFUZ 19Released date: July 20, 2011Price: $9.99 to buyOperating system: Windows NT/2000/XP/2003
PROPOSED SYSTEMThe proposed system is for academicpropose but it can be use by anypeople.FEATURES1.User friendly.2.Identification.3.Near real-time approach6/4/2013 MAHFUZ 20The secret to discovery is to never believeexisting facts.-Bryant H. McGill, American author.
SURAKSHA: SECUREYOUR FILES..6/4/2013 MAHFUZ 21Proper names are poetry in the raw. Likeall poetry they are untranslatable.-W.H. Auden, Anglo-American poet.
6/4/2013 MAHFUZ 22Advertising is a bit like playing make-believe.-Hartman Jule,
The main goal of Suraksha isIdentity management.Voice biometric has provided analternative to other techniques in thearea of identity management.This is particularly important in thesituation where some people may notwant to buy other H/w as fingerprintreader etc.Voice biometric may consider as analternatives for handicap people forthe purpose of equal treatment oreven for enhanced security.6/4/2013 MAHFUZ 23
There will be two phases in Surakshato secure a file.1st voice password2nd keyboard password6/4/2013 MAHFUZ 24While a user wants to lock a file,he/she have to go through this twophases.During locking a file initially the userhave to give his voice password.And then the user have to provide atext password.
During unlocking a file, the user haveto give his voice as a input, if itmatches the voice, which is usedduring lock the file then it will allowthe user to go to the next phase.6/4/2013 MAHFUZ 25Then the user have to give the textpassword, if it matches then thesystem will unlock the file.
Why two phases..?Guarding by two is more secure.If somehow anyone crack firstlevel, then he have to go through onemore level of password.This gives more protection.6/4/2013 MAHFUZ 26
Flow-chart6/4/2013 MAHFUZ 27startendSelect a file to lockDisable all the user privileges from that fileEncrypt the content of the file and save itwith another extensionTake voicepasswordTake textpasswordFlow-chart for storing andlocking
6/4/2013 MAHFUZ 28startendSelect a file to unlock (with another extension)Enable all the user privileges from that fileDecrypt the content of the file and save it withoriginal extensionTake voicepasswordAsk for textpasswordCompare with thestored voice and checkmatching probability is>= 0.9If matchesyesyesNo(3 times)No(3 times)Flow-chart for authenticationand unlocking
Storing the audio(voice) andaudio file formatAn audio file format is a fileformat for storing digital audiodata on a computer system.This data can be storeduncompressed, or compressed toreduce the file size.6/4/2013 MAHFUZ 29Audio manipulation is a black art.-Unknown
There are three major groups of audiofile formats: Uncompressed audio formats; Formats with lossless compression. Formats with lossy compression.6/4/2013 MAHFUZ 30In Suraksha I am using “.wav”extension to save a voice..wav comes under Uncompressed audioformats.The Wave file format is Windows nativefile format for storing digital audio data.
Wav files are formed by a header partand a data part.As the header part includes binarydata with different characteristics, itcan be appropriate to read data ofdifferent types.6/4/2013 MAHFUZ 31
How to compare..!!After storing the audio and lock thefile, to unlock, we have to comparethe newly recorded wav file withpreviously stored wav file.For that we have to apply Digitalsignal processing on the both wavfiles.6/4/2013 MAHFUZ 35
Digital signal processingDigital signal processing (DSP) isthe mathematical manipulation of aninformation signal to modify orimprove it in some way.With the increasing use of computersthe usage of and need for digitalsignal processing has increased.To use an analog signal on acomputer, it must be digitized fromanalog-to-digital signal.6/4/2013 MAHFUZ 36
The following diagram shows theanalog to digital conversion process.The red line only matches the blue lineat discrete points and these are calledthe sampling points.It is very important to take enoughsamples of the input so that it can befaithfully represented.6/4/2013 MAHFUZ 37
The goal of DSP is usually tomeasure, filter and/or compresscontinuous real-world analog signals.The first step is usually to convert thesignal from an analog to a digital form.Discrete Fourier transform (DFT) is aspecific kind of discrete transform, ittransforms one function intoanother, which is called the frequencydomain representation, of the originalfunction (which is often a function in thetime domain).In frequency domain, it is easy tocompare two voices, because, its has avery low probability of mismatch of aperson‟s voice‟s frequency.6/4/2013 MAHFUZ 38
DFTThe DFT requires an input function that isdiscrete. Such inputs are often created bysampling a continuous function, such as apersons voice.The discrete input function must also havea limited (finite) duration, such as oneperiod of a periodic sequence or awindowed segment of a longer sequence.One big disadvantage of DFT is that it isvery time taking. Its time complexity isO(n²).So while using DFT for a large number willtake a very long time.6/4/2013 MAHFUZ 39
Fast Fourier Transform(FFT)The Fast Fourier Transform (FFT) is anefficient algorithm for calculating theDFT. While it produces the same resultas the other approaches.It is incredibly more efficient, oftenreducing the computation time byhundreds.FFT can compute the same result inonly O(N log N) operations.6/4/2013 MAHFUZ 40
This is a divide and conquer algorithmthat recursively breaks down a DFT ofany composite size N = N1N2 intomany smaller DFTs of sizes N1 and N2.This divides the transform into twopieces of size N/2 at each step.The second step is to calculate the Nfrequency spectra corresponding tothese N time domain signals.Lastly, the N spectra are synthesizedinto a single frequency spectrum.6/4/2013 MAHFUZ 41
After converting to frequency domainit forms a complex number.6/4/2013 MAHFUZ 42
When to declare match..!!After converting into frequencydomain, we have find the probabilityof matching between the two files.If finds that probability is equal to orgreater than 0.9, then we may say asthe two wav files are equal.6/4/2013 MAHFUZ 43
How to lock a file..?After taking both voice and textpassword, the system will lock the file.Encrypt the content of the file and willchange the extension to an anotherextension.Disable the user privilegesi.e., read, write etc from that file.6/4/2013 MAHFUZ 44
How to unlock a file..?During authentication, if both the voiceand text password matches, thesystem will unlock the file.Enable the user privileges for that file.Decrypt the content of the file andsave it with original extension.6/4/2013 MAHFUZ 45
FEASIBILITY STUDYTechnical feasibility:Additional hardware is required for record avoice.6/4/2013 MAHFUZ 46Economic feasibility:Existing hardware and software will beused so no additional expenditure will berequired.
System requirementsHardware requirements:Intel Pentium, 2.0 GHz6/4/2013 MAHFUZ 47512MB RAMKey-boardMonitorMicrophoneMouse
CONCLUSIONVoice password usage example here for anidea of where and how it can be used.Its a good solution to protect internet oronline banking users from potential high-tech interception.This is important to protect users fromfinancial loss and misuse of personal data.For the time being I am trying toimplement it in only “.txt” files.6/4/2013 MAHFUZ 49