SlideShare a Scribd company logo
1 of 21
Intelligent and Secure Voice Based
Password System For Mobile
S. ARBINA SULTHANA
(Reg.No: 17PCS1474)
ST. JOSEPH’S COLLEGE OF ARTS
AND SCIENCE FOR WOMEN
Under the Guidance of:
Mrs. S.Bobby M.Sc., M.Phil.,
CONTENTS
 SYNOPSIS
 INTRODUCTION
 DATA FLOW DIAGRAM
 MODULE DISCRIPTION
 EXISTING SYSTEM
 PROPOSED SYSTEM
 SCREEN SHOTS
 CONCLUSION
Synopsis
• Over the years speech recognition has taken the
market.
• The speech input can be used in varying domains
such as automatic reader and for inputting data to the
system.
• Now it is possible to generate the desired speech
recognition output, One such method is the hidden
markov models (HMM) which is used in this paper.
• Voice input is inserted through any speech device such
as microphone, then speech can be processed and
convert it to text able to send SMS, also Phone number
can be entering by voice.
• In the world of computer technology, passwords play a
pivotal role. The aim of the Project is to make strong
Passwords on remote authentication.
• It combines all different methods of user
authentication to create a more robust digital vault for
personal data.
• Each password is encrypted with a new fresh key on
the user’s mobile device for maximum security.
Introduction
• The use of voice in mobile phones has opened up
the market for voice application.
• This application uses the Google api which uses the
hidden markov models (HMM) method to send
SMS.
• The user has to speak the numeric characters as the
contact information and the message box can accept
any character.
• The aim of the Project is to make strong Passwords
on remote authentication.
• Passwords are the main and most common method
of remote authentication.
• In today’s connected world, a person is registered in
multiple web services, each requiring a specific type
of password.
• Password managers are an approach to keeping our
passwords safe. However, they mainly rely on one
master password to secure all of our passwords.
• Also, there is no need to enter a master password
every time since speaker recognition is used.
• To view a password, the user only needs to utter the
name of a web service, and speaker and speech
recognition are applied for authentication.
• Only the key for that service is sent to the mobile
application and the password is decrypted and
displayed.
Data Flow Diagram
Module Description
• The system is developed by using Java technologies
which consists of two Applications:
i. One web based Applications
ii. Android Application.
Admin Module:
• Admin is the main user in the system who can able
to manage the users of the system.
• Admin can able to login into his web Application
and view the registered user details and if necessary
he can able to delete the unwanted users.
User Module (Android):
• User can able to register himself/ herself with this
Android Application and he/ she can able to login
into Android Application home page by using
authentication credentials.
• In home page user have following option:
 Voice based SMS.
 Create password.
 Retrieve password through voice.
 Retrieve all passwords using master password.
 Settings .
Voice based SMS :
• With the help of voice based SMS user no need to
type the text just he can dictate the text the dictated
voice will be converted into text Message with the
help of Google speech API and user can able to send
that text Message to any of its contacts.
Create password:
• With the help of create password user can able to
give password ID and original password. For
Example: Gmail or ICICI bank and password are
real password he kept. The entered details are
encrypted and stored in web server.
Retrieve password through voice:
• In this module user just say by voice Gmail or ICICI
bank this system will automatically recognize it has
user ID and convert user ID into text and send to
web server. The web server will retrieve
corresponding password based on password user ID
and send the encrypted password to the Android
Application once the encrypted password received
Android Application decrypt it and show the
original password to the user.
Settings:
• In this module user can able to retrieve all
passwords at a time which stored in web server at a
time for that the user has to provide master
password. With the help of setting module user can
able to reset his master password through otp SMS.
Existing System
• Generally, there are three different types of such
password managers.
• The first category is desktop password managers
where user passwords are stored locally on the
user’s computing device.
• The second category stores user passwords online on
third-party cloud servers. Password managers offer
mobility, but the user has to trust the third party.
• The third category stores passwords on dedicated
USB devices.
Proposed System
• The proposed phone based online password manager
combines all three methods of authentication.
• Each user password will be encrypted a fresh randomly
chosen key.
• To retrieve the keys, the user is required to authenticate
using the user’s voice.
• Speaker recognition and speech recognition are applied
to the user’s voice to confirm user authenticity. Then the
keys related to the service name the user asked for are
sent back to the phone.
• The application displays usernames and passwords only
for the requested web service.
Screen Shots
Home Page: User Details:
Signup
Page:
User Login Page:
Home
Page:
Menu:
Voice Message:
Speaking through
Google API:
Master Password: Password Details:
Speech Recognition: Password Details:
Conclusion
• An automatic speech recognizer studied and
implemented on the android platform which gives
much accuracy for both numeric and alpha numeric
inputs.
• The accuracy of this system is about 90%, and delay
for recognition is less than 100 ns. We plan to
implement this work for other languages as well as
test them on the SMS sending application which is
developed.
Arbina project

More Related Content

What's hot

IRJET- Voice based E-mail system
IRJET- Voice based E-mail systemIRJET- Voice based E-mail system
IRJET- Voice based E-mail systemIRJET Journal
 
Summer IT Training in Chandigarh by JK Soft Tech Solutions
Summer IT Training in Chandigarh by JK Soft Tech SolutionsSummer IT Training in Chandigarh by JK Soft Tech Solutions
Summer IT Training in Chandigarh by JK Soft Tech SolutionsNaresh Dhamija
 
Usb based secure e mail
Usb based secure e mailUsb based secure e mail
Usb based secure e mailcsandit
 
Optical hebrew character recognition
Optical hebrew character recognitionOptical hebrew character recognition
Optical hebrew character recognitionAlex Hefetz
 
Pavan_Kumar_S_Frehser
Pavan_Kumar_S_FrehserPavan_Kumar_S_Frehser
Pavan_Kumar_S_FrehserPAVAN KUMAR S
 
Arrow AI: Automated Customer Care
Arrow AI: Automated Customer CareArrow AI: Automated Customer Care
Arrow AI: Automated Customer CareUtkarsh Shukla
 
SMOWSER (A VOICE BASED BROWSER)
SMOWSER (A VOICE BASED BROWSER)SMOWSER (A VOICE BASED BROWSER)
SMOWSER (A VOICE BASED BROWSER)NEERAJ BAGHEL
 
VOICE COMMAND SYSTEM USING RASPBERRY PI
VOICE COMMAND SYSTEM USING RASPBERRY PIVOICE COMMAND SYSTEM USING RASPBERRY PI
VOICE COMMAND SYSTEM USING RASPBERRY PIaciijournal
 

What's hot (13)

IRJET- Voice based E-mail system
IRJET- Voice based E-mail systemIRJET- Voice based E-mail system
IRJET- Voice based E-mail system
 
Onlinechat
OnlinechatOnlinechat
Onlinechat
 
Summer IT Training in Chandigarh by JK Soft Tech Solutions
Summer IT Training in Chandigarh by JK Soft Tech SolutionsSummer IT Training in Chandigarh by JK Soft Tech Solutions
Summer IT Training in Chandigarh by JK Soft Tech Solutions
 
Usb based secure e mail
Usb based secure e mailUsb based secure e mail
Usb based secure e mail
 
Sms read app
Sms read appSms read app
Sms read app
 
Optical hebrew character recognition
Optical hebrew character recognitionOptical hebrew character recognition
Optical hebrew character recognition
 
Pavan_Kumar_S_Frehser
Pavan_Kumar_S_FrehserPavan_Kumar_S_Frehser
Pavan_Kumar_S_Frehser
 
Arrow AI: Automated Customer Care
Arrow AI: Automated Customer CareArrow AI: Automated Customer Care
Arrow AI: Automated Customer Care
 
Res2016
Res2016Res2016
Res2016
 
SMOWSER (A VOICE BASED BROWSER)
SMOWSER (A VOICE BASED BROWSER)SMOWSER (A VOICE BASED BROWSER)
SMOWSER (A VOICE BASED BROWSER)
 
Dhritiman banerjee Resume
Dhritiman banerjee  ResumeDhritiman banerjee  Resume
Dhritiman banerjee Resume
 
Ivrs
IvrsIvrs
Ivrs
 
VOICE COMMAND SYSTEM USING RASPBERRY PI
VOICE COMMAND SYSTEM USING RASPBERRY PIVOICE COMMAND SYSTEM USING RASPBERRY PI
VOICE COMMAND SYSTEM USING RASPBERRY PI
 

Similar to Arbina project

Whatscrypt Messenger for android project
Whatscrypt Messenger for android projectWhatscrypt Messenger for android project
Whatscrypt Messenger for android projectMuthukumaranM13
 
Java project titles
Java project titlesJava project titles
Java project titlesAshly Liza
 
Internet security evaluation system documentation nikitha
Internet security evaluation system documentation nikithaInternet security evaluation system documentation nikitha
Internet security evaluation system documentation nikithaSusmitha Reddy
 
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATIONGENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATIONcscpconf
 
software testing on whatsapp
software testing on whatsappsoftware testing on whatsapp
software testing on whatsappnil65
 
Social messenger introduction
Social messenger introductionSocial messenger introduction
Social messenger introductiondeepakrajput022
 
One time password generation using mathematical random function in sphere spa...
One time password generation using mathematical random function in sphere spa...One time password generation using mathematical random function in sphere spa...
One time password generation using mathematical random function in sphere spa...EditorIJAERD
 
Voice based Email Application for Blinds
Voice based Email Application for BlindsVoice based Email Application for Blinds
Voice based Email Application for Blindsfaizulatif19
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Two Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordTwo Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordIOSR Journals
 
Enhanced adaptive security system for SMS – based One Time Password
Enhanced adaptive security system for SMS – based One Time Password Enhanced adaptive security system for SMS – based One Time Password
Enhanced adaptive security system for SMS – based One Time Password Chandrapriya Rediex
 
User authentication
User authenticationUser authentication
User authenticationCAS
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
CSE 7th and 8th Semester Project Demo
CSE 7th and 8th Semester Project DemoCSE 7th and 8th Semester Project Demo
CSE 7th and 8th Semester Project DemoAsif Aunto
 
Kurogo Higher Ed Mobile Conference 2017: How Mobility is Driving Changes in C...
Kurogo Higher Ed Mobile Conference 2017: How Mobility is Driving Changes in C...Kurogo Higher Ed Mobile Conference 2017: How Mobility is Driving Changes in C...
Kurogo Higher Ed Mobile Conference 2017: How Mobility is Driving Changes in C...modolabs
 
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesEffectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesIAEME Publication
 

Similar to Arbina project (20)

Whatscrypt Messenger for android project
Whatscrypt Messenger for android projectWhatscrypt Messenger for android project
Whatscrypt Messenger for android project
 
Java project titles
Java project titlesJava project titles
Java project titles
 
87559489 auth
87559489 auth87559489 auth
87559489 auth
 
Internet security evaluation system documentation nikitha
Internet security evaluation system documentation nikithaInternet security evaluation system documentation nikitha
Internet security evaluation system documentation nikitha
 
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATIONGENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
 
software testing on whatsapp
software testing on whatsappsoftware testing on whatsapp
software testing on whatsapp
 
Social messenger introduction
Social messenger introductionSocial messenger introduction
Social messenger introduction
 
One time password generation using mathematical random function in sphere spa...
One time password generation using mathematical random function in sphere spa...One time password generation using mathematical random function in sphere spa...
One time password generation using mathematical random function in sphere spa...
 
Opass
OpassOpass
Opass
 
Voice based Email Application for Blinds
Voice based Email Application for BlindsVoice based Email Application for Blinds
Voice based Email Application for Blinds
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Two Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordTwo Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time Password
 
Enhanced adaptive security system for SMS – based One Time Password
Enhanced adaptive security system for SMS – based One Time Password Enhanced adaptive security system for SMS – based One Time Password
Enhanced adaptive security system for SMS – based One Time Password
 
mob
mobmob
mob
 
User authentication
User authenticationUser authentication
User authentication
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
CSE 7th and 8th Semester Project Demo
CSE 7th and 8th Semester Project DemoCSE 7th and 8th Semester Project Demo
CSE 7th and 8th Semester Project Demo
 
Our Project
Our ProjectOur Project
Our Project
 
Kurogo Higher Ed Mobile Conference 2017: How Mobility is Driving Changes in C...
Kurogo Higher Ed Mobile Conference 2017: How Mobility is Driving Changes in C...Kurogo Higher Ed Mobile Conference 2017: How Mobility is Driving Changes in C...
Kurogo Higher Ed Mobile Conference 2017: How Mobility is Driving Changes in C...
 
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesEffectiveness of various user authentication techniques
Effectiveness of various user authentication techniques
 

Recently uploaded

call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfCionsystems
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendArshad QA
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 

Recently uploaded (20)

call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdf
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and Backend
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 

Arbina project

  • 1. Intelligent and Secure Voice Based Password System For Mobile S. ARBINA SULTHANA (Reg.No: 17PCS1474) ST. JOSEPH’S COLLEGE OF ARTS AND SCIENCE FOR WOMEN Under the Guidance of: Mrs. S.Bobby M.Sc., M.Phil.,
  • 2. CONTENTS  SYNOPSIS  INTRODUCTION  DATA FLOW DIAGRAM  MODULE DISCRIPTION  EXISTING SYSTEM  PROPOSED SYSTEM  SCREEN SHOTS  CONCLUSION
  • 3. Synopsis • Over the years speech recognition has taken the market. • The speech input can be used in varying domains such as automatic reader and for inputting data to the system. • Now it is possible to generate the desired speech recognition output, One such method is the hidden markov models (HMM) which is used in this paper. • Voice input is inserted through any speech device such as microphone, then speech can be processed and convert it to text able to send SMS, also Phone number can be entering by voice.
  • 4. • In the world of computer technology, passwords play a pivotal role. The aim of the Project is to make strong Passwords on remote authentication. • It combines all different methods of user authentication to create a more robust digital vault for personal data. • Each password is encrypted with a new fresh key on the user’s mobile device for maximum security.
  • 5. Introduction • The use of voice in mobile phones has opened up the market for voice application. • This application uses the Google api which uses the hidden markov models (HMM) method to send SMS. • The user has to speak the numeric characters as the contact information and the message box can accept any character. • The aim of the Project is to make strong Passwords on remote authentication. • Passwords are the main and most common method of remote authentication.
  • 6. • In today’s connected world, a person is registered in multiple web services, each requiring a specific type of password. • Password managers are an approach to keeping our passwords safe. However, they mainly rely on one master password to secure all of our passwords. • Also, there is no need to enter a master password every time since speaker recognition is used. • To view a password, the user only needs to utter the name of a web service, and speaker and speech recognition are applied for authentication. • Only the key for that service is sent to the mobile application and the password is decrypted and displayed.
  • 8. Module Description • The system is developed by using Java technologies which consists of two Applications: i. One web based Applications ii. Android Application. Admin Module: • Admin is the main user in the system who can able to manage the users of the system. • Admin can able to login into his web Application and view the registered user details and if necessary he can able to delete the unwanted users.
  • 9. User Module (Android): • User can able to register himself/ herself with this Android Application and he/ she can able to login into Android Application home page by using authentication credentials. • In home page user have following option:  Voice based SMS.  Create password.  Retrieve password through voice.  Retrieve all passwords using master password.  Settings .
  • 10. Voice based SMS : • With the help of voice based SMS user no need to type the text just he can dictate the text the dictated voice will be converted into text Message with the help of Google speech API and user can able to send that text Message to any of its contacts. Create password: • With the help of create password user can able to give password ID and original password. For Example: Gmail or ICICI bank and password are real password he kept. The entered details are encrypted and stored in web server.
  • 11. Retrieve password through voice: • In this module user just say by voice Gmail or ICICI bank this system will automatically recognize it has user ID and convert user ID into text and send to web server. The web server will retrieve corresponding password based on password user ID and send the encrypted password to the Android Application once the encrypted password received Android Application decrypt it and show the original password to the user. Settings: • In this module user can able to retrieve all passwords at a time which stored in web server at a time for that the user has to provide master password. With the help of setting module user can able to reset his master password through otp SMS.
  • 12. Existing System • Generally, there are three different types of such password managers. • The first category is desktop password managers where user passwords are stored locally on the user’s computing device. • The second category stores user passwords online on third-party cloud servers. Password managers offer mobility, but the user has to trust the third party. • The third category stores passwords on dedicated USB devices.
  • 13. Proposed System • The proposed phone based online password manager combines all three methods of authentication. • Each user password will be encrypted a fresh randomly chosen key. • To retrieve the keys, the user is required to authenticate using the user’s voice. • Speaker recognition and speech recognition are applied to the user’s voice to confirm user authenticity. Then the keys related to the service name the user asked for are sent back to the phone. • The application displays usernames and passwords only for the requested web service.
  • 14. Screen Shots Home Page: User Details:
  • 20. Conclusion • An automatic speech recognizer studied and implemented on the android platform which gives much accuracy for both numeric and alpha numeric inputs. • The accuracy of this system is about 90%, and delay for recognition is less than 100 ns. We plan to implement this work for other languages as well as test them on the SMS sending application which is developed.