Intelligent and Secure Voice Based
Password System For Mobile
S. ARBINA SULTHANA
(Reg.No: 17PCS1474)
ST. JOSEPH’S COLLEGE OF ARTS
AND SCIENCE FOR WOMEN
Under the Guidance of:
Mrs. S.Bobby M.Sc., M.Phil.,
CONTENTS
 SYNOPSIS
 INTRODUCTION
 DATA FLOW DIAGRAM
 MODULE DISCRIPTION
 EXISTING SYSTEM
 PROPOSED SYSTEM
 SCREEN SHOTS
 CONCLUSION
Synopsis
• Over the years speech recognition has taken the
market.
• The speech input can be used in varying domains
such as automatic reader and for inputting data to the
system.
• Now it is possible to generate the desired speech
recognition output, One such method is the hidden
markov models (HMM) which is used in this paper.
• Voice input is inserted through any speech device such
as microphone, then speech can be processed and
convert it to text able to send SMS, also Phone number
can be entering by voice.
• In the world of computer technology, passwords play a
pivotal role. The aim of the Project is to make strong
Passwords on remote authentication.
• It combines all different methods of user
authentication to create a more robust digital vault for
personal data.
• Each password is encrypted with a new fresh key on
the user’s mobile device for maximum security.
Introduction
• The use of voice in mobile phones has opened up
the market for voice application.
• This application uses the Google api which uses the
hidden markov models (HMM) method to send
SMS.
• The user has to speak the numeric characters as the
contact information and the message box can accept
any character.
• The aim of the Project is to make strong Passwords
on remote authentication.
• Passwords are the main and most common method
of remote authentication.
• In today’s connected world, a person is registered in
multiple web services, each requiring a specific type
of password.
• Password managers are an approach to keeping our
passwords safe. However, they mainly rely on one
master password to secure all of our passwords.
• Also, there is no need to enter a master password
every time since speaker recognition is used.
• To view a password, the user only needs to utter the
name of a web service, and speaker and speech
recognition are applied for authentication.
• Only the key for that service is sent to the mobile
application and the password is decrypted and
displayed.
Data Flow Diagram
Module Description
• The system is developed by using Java technologies
which consists of two Applications:
i. One web based Applications
ii. Android Application.
Admin Module:
• Admin is the main user in the system who can able
to manage the users of the system.
• Admin can able to login into his web Application
and view the registered user details and if necessary
he can able to delete the unwanted users.
User Module (Android):
• User can able to register himself/ herself with this
Android Application and he/ she can able to login
into Android Application home page by using
authentication credentials.
• In home page user have following option:
 Voice based SMS.
 Create password.
 Retrieve password through voice.
 Retrieve all passwords using master password.
 Settings .
Voice based SMS :
• With the help of voice based SMS user no need to
type the text just he can dictate the text the dictated
voice will be converted into text Message with the
help of Google speech API and user can able to send
that text Message to any of its contacts.
Create password:
• With the help of create password user can able to
give password ID and original password. For
Example: Gmail or ICICI bank and password are
real password he kept. The entered details are
encrypted and stored in web server.
Retrieve password through voice:
• In this module user just say by voice Gmail or ICICI
bank this system will automatically recognize it has
user ID and convert user ID into text and send to
web server. The web server will retrieve
corresponding password based on password user ID
and send the encrypted password to the Android
Application once the encrypted password received
Android Application decrypt it and show the
original password to the user.
Settings:
• In this module user can able to retrieve all
passwords at a time which stored in web server at a
time for that the user has to provide master
password. With the help of setting module user can
able to reset his master password through otp SMS.
Existing System
• Generally, there are three different types of such
password managers.
• The first category is desktop password managers
where user passwords are stored locally on the
user’s computing device.
• The second category stores user passwords online on
third-party cloud servers. Password managers offer
mobility, but the user has to trust the third party.
• The third category stores passwords on dedicated
USB devices.
Proposed System
• The proposed phone based online password manager
combines all three methods of authentication.
• Each user password will be encrypted a fresh randomly
chosen key.
• To retrieve the keys, the user is required to authenticate
using the user’s voice.
• Speaker recognition and speech recognition are applied
to the user’s voice to confirm user authenticity. Then the
keys related to the service name the user asked for are
sent back to the phone.
• The application displays usernames and passwords only
for the requested web service.
Screen Shots
Home Page: User Details:
Signup
Page:
User Login Page:
Home
Page:
Menu:
Voice Message:
Speaking through
Google API:
Master Password: Password Details:
Speech Recognition: Password Details:
Conclusion
• An automatic speech recognizer studied and
implemented on the android platform which gives
much accuracy for both numeric and alpha numeric
inputs.
• The accuracy of this system is about 90%, and delay
for recognition is less than 100 ns. We plan to
implement this work for other languages as well as
test them on the SMS sending application which is
developed.
Arbina project

Arbina project

  • 1.
    Intelligent and SecureVoice Based Password System For Mobile S. ARBINA SULTHANA (Reg.No: 17PCS1474) ST. JOSEPH’S COLLEGE OF ARTS AND SCIENCE FOR WOMEN Under the Guidance of: Mrs. S.Bobby M.Sc., M.Phil.,
  • 2.
    CONTENTS  SYNOPSIS  INTRODUCTION DATA FLOW DIAGRAM  MODULE DISCRIPTION  EXISTING SYSTEM  PROPOSED SYSTEM  SCREEN SHOTS  CONCLUSION
  • 3.
    Synopsis • Over theyears speech recognition has taken the market. • The speech input can be used in varying domains such as automatic reader and for inputting data to the system. • Now it is possible to generate the desired speech recognition output, One such method is the hidden markov models (HMM) which is used in this paper. • Voice input is inserted through any speech device such as microphone, then speech can be processed and convert it to text able to send SMS, also Phone number can be entering by voice.
  • 4.
    • In theworld of computer technology, passwords play a pivotal role. The aim of the Project is to make strong Passwords on remote authentication. • It combines all different methods of user authentication to create a more robust digital vault for personal data. • Each password is encrypted with a new fresh key on the user’s mobile device for maximum security.
  • 5.
    Introduction • The useof voice in mobile phones has opened up the market for voice application. • This application uses the Google api which uses the hidden markov models (HMM) method to send SMS. • The user has to speak the numeric characters as the contact information and the message box can accept any character. • The aim of the Project is to make strong Passwords on remote authentication. • Passwords are the main and most common method of remote authentication.
  • 6.
    • In today’sconnected world, a person is registered in multiple web services, each requiring a specific type of password. • Password managers are an approach to keeping our passwords safe. However, they mainly rely on one master password to secure all of our passwords. • Also, there is no need to enter a master password every time since speaker recognition is used. • To view a password, the user only needs to utter the name of a web service, and speaker and speech recognition are applied for authentication. • Only the key for that service is sent to the mobile application and the password is decrypted and displayed.
  • 7.
  • 8.
    Module Description • Thesystem is developed by using Java technologies which consists of two Applications: i. One web based Applications ii. Android Application. Admin Module: • Admin is the main user in the system who can able to manage the users of the system. • Admin can able to login into his web Application and view the registered user details and if necessary he can able to delete the unwanted users.
  • 9.
    User Module (Android): •User can able to register himself/ herself with this Android Application and he/ she can able to login into Android Application home page by using authentication credentials. • In home page user have following option:  Voice based SMS.  Create password.  Retrieve password through voice.  Retrieve all passwords using master password.  Settings .
  • 10.
    Voice based SMS: • With the help of voice based SMS user no need to type the text just he can dictate the text the dictated voice will be converted into text Message with the help of Google speech API and user can able to send that text Message to any of its contacts. Create password: • With the help of create password user can able to give password ID and original password. For Example: Gmail or ICICI bank and password are real password he kept. The entered details are encrypted and stored in web server.
  • 11.
    Retrieve password throughvoice: • In this module user just say by voice Gmail or ICICI bank this system will automatically recognize it has user ID and convert user ID into text and send to web server. The web server will retrieve corresponding password based on password user ID and send the encrypted password to the Android Application once the encrypted password received Android Application decrypt it and show the original password to the user. Settings: • In this module user can able to retrieve all passwords at a time which stored in web server at a time for that the user has to provide master password. With the help of setting module user can able to reset his master password through otp SMS.
  • 12.
    Existing System • Generally,there are three different types of such password managers. • The first category is desktop password managers where user passwords are stored locally on the user’s computing device. • The second category stores user passwords online on third-party cloud servers. Password managers offer mobility, but the user has to trust the third party. • The third category stores passwords on dedicated USB devices.
  • 13.
    Proposed System • Theproposed phone based online password manager combines all three methods of authentication. • Each user password will be encrypted a fresh randomly chosen key. • To retrieve the keys, the user is required to authenticate using the user’s voice. • Speaker recognition and speech recognition are applied to the user’s voice to confirm user authenticity. Then the keys related to the service name the user asked for are sent back to the phone. • The application displays usernames and passwords only for the requested web service.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
    Conclusion • An automaticspeech recognizer studied and implemented on the android platform which gives much accuracy for both numeric and alpha numeric inputs. • The accuracy of this system is about 90%, and delay for recognition is less than 100 ns. We plan to implement this work for other languages as well as test them on the SMS sending application which is developed.