The Design of Secure File Transfer with Speech Recognition

Main Article Content

Anu Saini
Vinita Malik
Sukhdip sangwan

Abstract

The design of a secure file transfer system using Speech Recognition technique is investigated. Though cryptography enforces protection specifications, complements various other protection mechanisms. Different file types are enciphered by different cryptographic keys, supplied at access time by the users, who are being authorized using speech recognition technique. Several protection implementation schemes are analyzed according to the criteria such as: security, efficiency, and user convenience.

Downloads

Download data is not yet available.

Article Details

Section
Articles
Author Biographies

Anu Saini, G.B.PANT GOVT. ENGINEERING COLLEGE

ASSISTANT PROFESSOR IN COMPUTER SCIENCE DEPARTMENT

Vinita Malik, CENTRAL UNIVERSITY OF HARYANA

INFORMATION SCIENTIST AT CENTRAL LIBRARY

Sukhdip sangwan, D.C.R.U.S.T,MURTHAL

ASSISTANT PROFESSOR , COMPUTER SCIENCE

References

L.Brown , M. G. Jaatun , “Secure File Transfer Over TCP/IP†, IEEE, International Conference on ''Technology Enabling Tomorrow : Computers, Communications and Automation towards the 21st Centuryâ€, 1992

E.Gudes, “The Design of a Cryptography Based Secure File Systemâ€; September 1980, IEEE Vol. SE-6

S. Rekik, D. Guerchi , S. Selouani3, “Speech steganography using wavelet and Fourier transformsâ€, EURASIP Journal on Audio, Speech, and Music Processing , 2012, p 1-14

T.Nilsson ,“Speech Recognition Software and Vidispineâ€; Master’s Thesis in Computing Science, UmeËša University Department of Computing Science, April 2,2013

A. Srinivasan, "Real time speaker recognition of letter ‘zha’ in Tamil language" , 2013 Fourth International Conference on Computing Communications and Networking Technologies (ICCCNT), 2013

H.Barfuss, C.Huemmer, A.Schwarz, “Robust coherence-based spectral enhancement for speech recognition in adverse real-world environmentsâ€, Computer Speech & Language ,2017, p 1-13

S. Sunny , “Performance of Different Classifiers In Speech Recognitionâ€; IJESE, ISSN: 2319 – 1163, Volume: 2, Issue: 4,2013

R.S.Jamgekar, G.S. Joshi “File Encryption and Decryption Using Secure RSAâ€, (IJESE) ISSN: 2319–6378, Volume-1, Issue-4, February 2013

“Overcoming Key File Transfer Problemsâ€; An Osterman Research White Paper, September 2010

H.N.M.Shah, M.Z.A.Rashid “Biometric Voice Recognition in Security Systemâ€, Indian Journal of Science and Technology, Vol 7(2), 104–112, February 2014

L. D. Terissi , G. D. Sad ,“Noisy Speech Recognition Based on Combined Audio-Visual Classifiers Lecture Notes in Computer Science, vol 8869. Springer, 2014

S. S.Jarandel ,S. Waghmare , A Survey on Different Classifier in Speech Recognition Techniques, International Journal of Emerging Technology and Advanced Engineering, Volume 5, Issue 3, March 2014

V. Mitra, G. Sivaraman, “Hybrid Convolutional neural networks for articulatory and acoustic information based speech recognition †International Journal on Speech Communication, Volume 89, May 2017, Pages 103–112

“Making File Transfer Easier, Compliant and More Secureâ€;An Osterman Research White Paper, February 2012

T.Nilsson ,“Speech Recognition Software and Vidispineâ€; Master’s Thesis in Computing Science, UmeËša University Department of Computing Science, April 2,2013

Z. Jun, S. Kwong, Using Mel-Frequency Cepstral Coefficients in Missing Data Technique, EURASIP Journal on Applied Signal Processing :3, 340–346 ,2004