{"title":"Speech based file lock: a design approach","authors":"P. Bajaj, A. Mandlekar","doi":"10.1109/SICE.2000.889696","DOIUrl":null,"url":null,"abstract":"There are hacking software which can pick up everything entered through the keyboard and store it in to a buffer. Hence a password entered through the keyboard can be easily hacked. However, if a password is spoken and the frequencies are considered, there is no software to-date which can hack frequencies. The authors present an innovative technique towards desktop file hiding. The software based on this work is capable of locking files such that only the user who has locked them with his spoken password can access them. The locking of .WAV files is explained.","PeriodicalId":254956,"journal":{"name":"SICE 2000. Proceedings of the 39th SICE Annual Conference. International Session Papers (IEEE Cat. No.00TH8545)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2000-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"SICE 2000. Proceedings of the 39th SICE Annual Conference. International Session Papers (IEEE Cat. No.00TH8545)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SICE.2000.889696","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
There are hacking software which can pick up everything entered through the keyboard and store it in to a buffer. Hence a password entered through the keyboard can be easily hacked. However, if a password is spoken and the frequencies are considered, there is no software to-date which can hack frequencies. The authors present an innovative technique towards desktop file hiding. The software based on this work is capable of locking files such that only the user who has locked them with his spoken password can access them. The locking of .WAV files is explained.