SlideShare a Scribd company logo
Intelligent and Secure Voice Based
Password System For Mobile
S. ARBINA SULTHANA
(Reg.No: 17PCS1474)
ST. JOSEPH’S COLLEGE OF ARTS
AND SCIENCE FOR WOMEN
Under the Guidance of:
Mrs. S.Bobby M.Sc., M.Phil.,
CONTENTS
 SYNOPSIS
 INTRODUCTION
 DATA FLOW DIAGRAM
 MODULE DISCRIPTION
 EXISTING SYSTEM
 PROPOSED SYSTEM
 SCREEN SHOTS
 CONCLUSION
Synopsis
• Over the years speech recognition has taken the
market.
• The speech input can be used in varying domains
such as automatic reader and for inputting data to the
system.
• Now it is possible to generate the desired speech
recognition output, One such method is the hidden
markov models (HMM) which is used in this paper.
• Voice input is inserted through any speech device such
as microphone, then speech can be processed and
convert it to text able to send SMS, also Phone number
can be entering by voice.
• In the world of computer technology, passwords play a
pivotal role. The aim of the Project is to make strong
Passwords on remote authentication.
• It combines all different methods of user
authentication to create a more robust digital vault for
personal data.
• Each password is encrypted with a new fresh key on
the user’s mobile device for maximum security.
Introduction
• The use of voice in mobile phones has opened up
the market for voice application.
• This application uses the Google api which uses the
hidden markov models (HMM) method to send
SMS.
• The user has to speak the numeric characters as the
contact information and the message box can accept
any character.
• The aim of the Project is to make strong Passwords
on remote authentication.
• Passwords are the main and most common method
of remote authentication.
• In today’s connected world, a person is registered in
multiple web services, each requiring a specific type
of password.
• Password managers are an approach to keeping our
passwords safe. However, they mainly rely on one
master password to secure all of our passwords.
• Also, there is no need to enter a master password
every time since speaker recognition is used.
• To view a password, the user only needs to utter the
name of a web service, and speaker and speech
recognition are applied for authentication.
• Only the key for that service is sent to the mobile
application and the password is decrypted and
displayed.
Data Flow Diagram
Module Description
• The system is developed by using Java technologies
which consists of two Applications:
i. One web based Applications
ii. Android Application.
Admin Module:
• Admin is the main user in the system who can able
to manage the users of the system.
• Admin can able to login into his web Application
and view the registered user details and if necessary
he can able to delete the unwanted users.
User Module (Android):
• User can able to register himself/ herself with this
Android Application and he/ she can able to login
into Android Application home page by using
authentication credentials.
• In home page user have following option:
 Voice based SMS.
 Create password.
 Retrieve password through voice.
 Retrieve all passwords using master password.
 Settings .
Voice based SMS :
• With the help of voice based SMS user no need to
type the text just he can dictate the text the dictated
voice will be converted into text Message with the
help of Google speech API and user can able to send
that text Message to any of its contacts.
Create password:
• With the help of create password user can able to
give password ID and original password. For
Example: Gmail or ICICI bank and password are
real password he kept. The entered details are
encrypted and stored in web server.
Retrieve password through voice:
• In this module user just say by voice Gmail or ICICI
bank this system will automatically recognize it has
user ID and convert user ID into text and send to
web server. The web server will retrieve
corresponding password based on password user ID
and send the encrypted password to the Android
Application once the encrypted password received
Android Application decrypt it and show the
original password to the user.
Settings:
• In this module user can able to retrieve all
passwords at a time which stored in web server at a
time for that the user has to provide master
password. With the help of setting module user can
able to reset his master password through otp SMS.
Existing System
• Generally, there are three different types of such
password managers.
• The first category is desktop password managers
where user passwords are stored locally on the
user’s computing device.
• The second category stores user passwords online on
third-party cloud servers. Password managers offer
mobility, but the user has to trust the third party.
• The third category stores passwords on dedicated
USB devices.
Proposed System
• The proposed phone based online password manager
combines all three methods of authentication.
• Each user password will be encrypted a fresh randomly
chosen key.
• To retrieve the keys, the user is required to authenticate
using the user’s voice.
• Speaker recognition and speech recognition are applied
to the user’s voice to confirm user authenticity. Then the
keys related to the service name the user asked for are
sent back to the phone.
• The application displays usernames and passwords only
for the requested web service.
Screen Shots
Home Page: User Details:
Signup
Page:
User Login Page:
Home
Page:
Menu:
Voice Message:
Speaking through
Google API:
Master Password: Password Details:
Speech Recognition: Password Details:
Conclusion
• An automatic speech recognizer studied and
implemented on the android platform which gives
much accuracy for both numeric and alpha numeric
inputs.
• The accuracy of this system is about 90%, and delay
for recognition is less than 100 ns. We plan to
implement this work for other languages as well as
test them on the SMS sending application which is
developed.
Arbina project

More Related Content

What's hot

IRJET- Voice based E-mail system
IRJET- Voice based E-mail systemIRJET- Voice based E-mail system
IRJET- Voice based E-mail system
IRJET Journal
 
Onlinechat
OnlinechatOnlinechat
Onlinechat
shavetaverma
 
Summer IT Training in Chandigarh by JK Soft Tech Solutions
Summer IT Training in Chandigarh by JK Soft Tech SolutionsSummer IT Training in Chandigarh by JK Soft Tech Solutions
Summer IT Training in Chandigarh by JK Soft Tech Solutions
Naresh Dhamija
 
Usb based secure e mail
Usb based secure e mailUsb based secure e mail
Usb based secure e mail
csandit
 
Sms read app
Sms read appSms read app
Sms read app
sai charan
 
Optical hebrew character recognition
Optical hebrew character recognitionOptical hebrew character recognition
Optical hebrew character recognition
Alex Hefetz
 
Pavan_Kumar_S_Frehser
Pavan_Kumar_S_FrehserPavan_Kumar_S_Frehser
Pavan_Kumar_S_Frehser
PAVAN KUMAR S
 
Arrow AI: Automated Customer Care
Arrow AI: Automated Customer CareArrow AI: Automated Customer Care
Arrow AI: Automated Customer Care
Utkarsh Shukla
 
Res2016
Res2016Res2016
SMOWSER (A VOICE BASED BROWSER)
SMOWSER (A VOICE BASED BROWSER)SMOWSER (A VOICE BASED BROWSER)
SMOWSER (A VOICE BASED BROWSER)
NEERAJ BAGHEL
 
Dhritiman banerjee Resume
Dhritiman banerjee  ResumeDhritiman banerjee  Resume
Dhritiman banerjee Resume
Dhritiman Banerjee
 
Ivrs
IvrsIvrs
VOICE COMMAND SYSTEM USING RASPBERRY PI
VOICE COMMAND SYSTEM USING RASPBERRY PIVOICE COMMAND SYSTEM USING RASPBERRY PI
VOICE COMMAND SYSTEM USING RASPBERRY PI
aciijournal
 

What's hot (13)

IRJET- Voice based E-mail system
IRJET- Voice based E-mail systemIRJET- Voice based E-mail system
IRJET- Voice based E-mail system
 
Onlinechat
OnlinechatOnlinechat
Onlinechat
 
Summer IT Training in Chandigarh by JK Soft Tech Solutions
Summer IT Training in Chandigarh by JK Soft Tech SolutionsSummer IT Training in Chandigarh by JK Soft Tech Solutions
Summer IT Training in Chandigarh by JK Soft Tech Solutions
 
Usb based secure e mail
Usb based secure e mailUsb based secure e mail
Usb based secure e mail
 
Sms read app
Sms read appSms read app
Sms read app
 
Optical hebrew character recognition
Optical hebrew character recognitionOptical hebrew character recognition
Optical hebrew character recognition
 
Pavan_Kumar_S_Frehser
Pavan_Kumar_S_FrehserPavan_Kumar_S_Frehser
Pavan_Kumar_S_Frehser
 
Arrow AI: Automated Customer Care
Arrow AI: Automated Customer CareArrow AI: Automated Customer Care
Arrow AI: Automated Customer Care
 
Res2016
Res2016Res2016
Res2016
 
SMOWSER (A VOICE BASED BROWSER)
SMOWSER (A VOICE BASED BROWSER)SMOWSER (A VOICE BASED BROWSER)
SMOWSER (A VOICE BASED BROWSER)
 
Dhritiman banerjee Resume
Dhritiman banerjee  ResumeDhritiman banerjee  Resume
Dhritiman banerjee Resume
 
Ivrs
IvrsIvrs
Ivrs
 
VOICE COMMAND SYSTEM USING RASPBERRY PI
VOICE COMMAND SYSTEM USING RASPBERRY PIVOICE COMMAND SYSTEM USING RASPBERRY PI
VOICE COMMAND SYSTEM USING RASPBERRY PI
 

Similar to Arbina project

Whatscrypt Messenger for android project
Whatscrypt Messenger for android projectWhatscrypt Messenger for android project
Whatscrypt Messenger for android project
MuthukumaranM13
 
Java project titles
Java project titlesJava project titles
Java project titles
Ashly Liza
 
87559489 auth
87559489 auth87559489 auth
87559489 auth
homeworkping4
 
Internet security evaluation system documentation nikitha
Internet security evaluation system documentation nikithaInternet security evaluation system documentation nikitha
Internet security evaluation system documentation nikitha
Susmitha Reddy
 
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATIONGENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
cscpconf
 
software testing on whatsapp
software testing on whatsappsoftware testing on whatsapp
software testing on whatsapp
nil65
 
Social messenger introduction
Social messenger introductionSocial messenger introduction
Social messenger introduction
deepakrajput022
 
One time password generation using mathematical random function in sphere spa...
One time password generation using mathematical random function in sphere spa...One time password generation using mathematical random function in sphere spa...
One time password generation using mathematical random function in sphere spa...
EditorIJAERD
 
Opass
OpassOpass
Voice based Email Application for Blinds
Voice based Email Application for BlindsVoice based Email Application for Blinds
Voice based Email Application for Blinds
faizulatif19
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
 
Two Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordTwo Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time Password
IOSR Journals
 
Enhanced adaptive security system for SMS – based One Time Password
Enhanced adaptive security system for SMS – based One Time Password Enhanced adaptive security system for SMS – based One Time Password
Enhanced adaptive security system for SMS – based One Time Password
Chandrapriya Rediex
 
mob
mobmob
User authentication
User authenticationUser authentication
User authentication
CAS
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
 
Our Project
Our ProjectOur Project
Our Project
Asif Aunto
 
CSE 7th and 8th Semester Project Demo
CSE 7th and 8th Semester Project DemoCSE 7th and 8th Semester Project Demo
CSE 7th and 8th Semester Project Demo
Asif Aunto
 
Kurogo Higher Ed Mobile Conference 2017: How Mobility is Driving Changes in C...
Kurogo Higher Ed Mobile Conference 2017: How Mobility is Driving Changes in C...Kurogo Higher Ed Mobile Conference 2017: How Mobility is Driving Changes in C...
Kurogo Higher Ed Mobile Conference 2017: How Mobility is Driving Changes in C...
modolabs
 
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesEffectiveness of various user authentication techniques
Effectiveness of various user authentication techniques
IAEME Publication
 

Similar to Arbina project (20)

Whatscrypt Messenger for android project
Whatscrypt Messenger for android projectWhatscrypt Messenger for android project
Whatscrypt Messenger for android project
 
Java project titles
Java project titlesJava project titles
Java project titles
 
87559489 auth
87559489 auth87559489 auth
87559489 auth
 
Internet security evaluation system documentation nikitha
Internet security evaluation system documentation nikithaInternet security evaluation system documentation nikitha
Internet security evaluation system documentation nikitha
 
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATIONGENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
 
software testing on whatsapp
software testing on whatsappsoftware testing on whatsapp
software testing on whatsapp
 
Social messenger introduction
Social messenger introductionSocial messenger introduction
Social messenger introduction
 
One time password generation using mathematical random function in sphere spa...
One time password generation using mathematical random function in sphere spa...One time password generation using mathematical random function in sphere spa...
One time password generation using mathematical random function in sphere spa...
 
Opass
OpassOpass
Opass
 
Voice based Email Application for Blinds
Voice based Email Application for BlindsVoice based Email Application for Blinds
Voice based Email Application for Blinds
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Two Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordTwo Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time Password
 
Enhanced adaptive security system for SMS – based One Time Password
Enhanced adaptive security system for SMS – based One Time Password Enhanced adaptive security system for SMS – based One Time Password
Enhanced adaptive security system for SMS – based One Time Password
 
mob
mobmob
mob
 
User authentication
User authenticationUser authentication
User authentication
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Our Project
Our ProjectOur Project
Our Project
 
CSE 7th and 8th Semester Project Demo
CSE 7th and 8th Semester Project DemoCSE 7th and 8th Semester Project Demo
CSE 7th and 8th Semester Project Demo
 
Kurogo Higher Ed Mobile Conference 2017: How Mobility is Driving Changes in C...
Kurogo Higher Ed Mobile Conference 2017: How Mobility is Driving Changes in C...Kurogo Higher Ed Mobile Conference 2017: How Mobility is Driving Changes in C...
Kurogo Higher Ed Mobile Conference 2017: How Mobility is Driving Changes in C...
 
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesEffectiveness of various user authentication techniques
Effectiveness of various user authentication techniques
 

Recently uploaded

What’s New in Odoo 17 – A Complete Roadmap
What’s New in Odoo 17 – A Complete RoadmapWhat’s New in Odoo 17 – A Complete Roadmap
What’s New in Odoo 17 – A Complete Roadmap
Envertis Software Solutions
 
Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
Paul Brebner
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
Peter Muessig
 
Microservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we workMicroservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we work
Sven Peters
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
brainerhub1
 
Project Management: The Role of Project Dashboards.pdf
Project Management: The Role of Project Dashboards.pdfProject Management: The Role of Project Dashboards.pdf
Project Management: The Role of Project Dashboards.pdf
Karya Keeper
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
rodomar2
 
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdfBaha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid
 
Oracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptxOracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptx
Remote DBA Services
 
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
safelyiotech
 
UI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design SystemUI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design System
Peter Muessig
 
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Julian Hyde
 
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
XfilesPro
 
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
kalichargn70th171
 
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemUI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
Peter Muessig
 
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSISDECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
Tier1 app
 
A Comprehensive Guide on Implementing Real-World Mobile Testing Strategies fo...
A Comprehensive Guide on Implementing Real-World Mobile Testing Strategies fo...A Comprehensive Guide on Implementing Real-World Mobile Testing Strategies fo...
A Comprehensive Guide on Implementing Real-World Mobile Testing Strategies fo...
kalichargn70th171
 
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
The Third Creative Media
 
Modelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - AmsterdamModelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - Amsterdam
Alberto Brandolini
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
Remote DBA Services
 

Recently uploaded (20)

What’s New in Odoo 17 – A Complete Roadmap
What’s New in Odoo 17 – A Complete RoadmapWhat’s New in Odoo 17 – A Complete Roadmap
What’s New in Odoo 17 – A Complete Roadmap
 
Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
 
Microservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we workMicroservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we work
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
 
Project Management: The Role of Project Dashboards.pdf
Project Management: The Role of Project Dashboards.pdfProject Management: The Role of Project Dashboards.pdf
Project Management: The Role of Project Dashboards.pdf
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
 
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdfBaha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
 
Oracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptxOracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptx
 
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
 
UI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design SystemUI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design System
 
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)
 
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
 
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
 
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemUI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
 
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSISDECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
 
A Comprehensive Guide on Implementing Real-World Mobile Testing Strategies fo...
A Comprehensive Guide on Implementing Real-World Mobile Testing Strategies fo...A Comprehensive Guide on Implementing Real-World Mobile Testing Strategies fo...
A Comprehensive Guide on Implementing Real-World Mobile Testing Strategies fo...
 
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
 
Modelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - AmsterdamModelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - Amsterdam
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
 

Arbina project

  • 1. Intelligent and Secure Voice Based Password System For Mobile S. ARBINA SULTHANA (Reg.No: 17PCS1474) ST. JOSEPH’S COLLEGE OF ARTS AND SCIENCE FOR WOMEN Under the Guidance of: Mrs. S.Bobby M.Sc., M.Phil.,
  • 2. CONTENTS  SYNOPSIS  INTRODUCTION  DATA FLOW DIAGRAM  MODULE DISCRIPTION  EXISTING SYSTEM  PROPOSED SYSTEM  SCREEN SHOTS  CONCLUSION
  • 3. Synopsis • Over the years speech recognition has taken the market. • The speech input can be used in varying domains such as automatic reader and for inputting data to the system. • Now it is possible to generate the desired speech recognition output, One such method is the hidden markov models (HMM) which is used in this paper. • Voice input is inserted through any speech device such as microphone, then speech can be processed and convert it to text able to send SMS, also Phone number can be entering by voice.
  • 4. • In the world of computer technology, passwords play a pivotal role. The aim of the Project is to make strong Passwords on remote authentication. • It combines all different methods of user authentication to create a more robust digital vault for personal data. • Each password is encrypted with a new fresh key on the user’s mobile device for maximum security.
  • 5. Introduction • The use of voice in mobile phones has opened up the market for voice application. • This application uses the Google api which uses the hidden markov models (HMM) method to send SMS. • The user has to speak the numeric characters as the contact information and the message box can accept any character. • The aim of the Project is to make strong Passwords on remote authentication. • Passwords are the main and most common method of remote authentication.
  • 6. • In today’s connected world, a person is registered in multiple web services, each requiring a specific type of password. • Password managers are an approach to keeping our passwords safe. However, they mainly rely on one master password to secure all of our passwords. • Also, there is no need to enter a master password every time since speaker recognition is used. • To view a password, the user only needs to utter the name of a web service, and speaker and speech recognition are applied for authentication. • Only the key for that service is sent to the mobile application and the password is decrypted and displayed.
  • 8. Module Description • The system is developed by using Java technologies which consists of two Applications: i. One web based Applications ii. Android Application. Admin Module: • Admin is the main user in the system who can able to manage the users of the system. • Admin can able to login into his web Application and view the registered user details and if necessary he can able to delete the unwanted users.
  • 9. User Module (Android): • User can able to register himself/ herself with this Android Application and he/ she can able to login into Android Application home page by using authentication credentials. • In home page user have following option:  Voice based SMS.  Create password.  Retrieve password through voice.  Retrieve all passwords using master password.  Settings .
  • 10. Voice based SMS : • With the help of voice based SMS user no need to type the text just he can dictate the text the dictated voice will be converted into text Message with the help of Google speech API and user can able to send that text Message to any of its contacts. Create password: • With the help of create password user can able to give password ID and original password. For Example: Gmail or ICICI bank and password are real password he kept. The entered details are encrypted and stored in web server.
  • 11. Retrieve password through voice: • In this module user just say by voice Gmail or ICICI bank this system will automatically recognize it has user ID and convert user ID into text and send to web server. The web server will retrieve corresponding password based on password user ID and send the encrypted password to the Android Application once the encrypted password received Android Application decrypt it and show the original password to the user. Settings: • In this module user can able to retrieve all passwords at a time which stored in web server at a time for that the user has to provide master password. With the help of setting module user can able to reset his master password through otp SMS.
  • 12. Existing System • Generally, there are three different types of such password managers. • The first category is desktop password managers where user passwords are stored locally on the user’s computing device. • The second category stores user passwords online on third-party cloud servers. Password managers offer mobility, but the user has to trust the third party. • The third category stores passwords on dedicated USB devices.
  • 13. Proposed System • The proposed phone based online password manager combines all three methods of authentication. • Each user password will be encrypted a fresh randomly chosen key. • To retrieve the keys, the user is required to authenticate using the user’s voice. • Speaker recognition and speech recognition are applied to the user’s voice to confirm user authenticity. Then the keys related to the service name the user asked for are sent back to the phone. • The application displays usernames and passwords only for the requested web service.
  • 14. Screen Shots Home Page: User Details:
  • 20. Conclusion • An automatic speech recognizer studied and implemented on the android platform which gives much accuracy for both numeric and alpha numeric inputs. • The accuracy of this system is about 90%, and delay for recognition is less than 100 ns. We plan to implement this work for other languages as well as test them on the SMS sending application which is developed.