The Design of Secure File Transfer with Speech Recognition

Anu Saini, Vinita Malik, Sukhdip sangwan


The design of a secure file transfer system using Speech Recognition technique is investigated. Though cryptography enforces protection specifications, complements various other protection mechanisms. Different file types are enciphered by different cryptographic keys, supplied at access time by the users, who are being authorized using speech recognition technique. Several protection implementation schemes are analyzed according to the criteria such as: security, efficiency, and user convenience.


File Transfer, Speech Recognition, Cryptography

Full Text:



L.Brown , M. G. Jaatun , “Secure File Transfer Over TCP/IP” , IEEE, International Conference on ''Technology Enabling Tomorrow : Computers, Communications and Automation towards the 21st Century”, 1992

E.Gudes, “The Design of a Cryptography Based Secure File System”; September 1980, IEEE Vol. SE-6

S. Rekik, D. Guerchi , S. Selouani3, “Speech steganography using wavelet and Fourier transforms”, EURASIP Journal on Audio, Speech, and Music Processing , 2012, p 1-14

T.Nilsson ,“Speech Recognition Software and Vidispine”; Master’s Thesis in Computing Science, Ume˚a University Department of Computing Science, April 2,2013

A. Srinivasan, "Real time speaker recognition of letter ‘zha’ in Tamil language" , 2013 Fourth International Conference on Computing Communications and Networking Technologies (ICCCNT), 2013

H.Barfuss, C.Huemmer, A.Schwarz, “Robust coherence-based spectral enhancement for speech recognition in adverse real-world environments”, Computer Speech & Language ,2017, p 1-13

S. Sunny , “Performance of Different Classifiers In Speech Recognition”; IJESE, ISSN: 2319 – 1163, Volume: 2, Issue: 4,2013

R.S.Jamgekar, G.S. Joshi “File Encryption and Decryption Using Secure RSA”, (IJESE) ISSN: 2319–6378, Volume-1, Issue-4, February 2013

“Overcoming Key File Transfer Problems”; An Osterman Research White Paper, September 2010

H.N.M.Shah, M.Z.A.Rashid “Biometric Voice Recognition in Security System”, Indian Journal of Science and Technology, Vol 7(2), 104–112, February 2014

L. D. Terissi , G. D. Sad ,“Noisy Speech Recognition Based on Combined Audio-Visual Classifiers Lecture Notes in Computer Science, vol 8869. Springer, 2014

S. S.Jarandel ,S. Waghmare , A Survey on Different Classifier in Speech Recognition Techniques, International Journal of Emerging Technology and Advanced Engineering, Volume 5, Issue 3, March 2014

V. Mitra, G. Sivaraman, “Hybrid Convolutional neural networks for articulatory and acoustic information based speech recognition ” International Journal on Speech Communication, Volume 89, May 2017, Pages 103–112

“Making File Transfer Easier, Compliant and More Secure”;An Osterman Research White Paper, February 2012

T.Nilsson ,“Speech Recognition Software and Vidispine”; Master’s Thesis in Computing Science, Ume˚a University Department of Computing Science, April 2,2013

Z. Jun, S. Kwong, Using Mel-Frequency Cepstral Coefficients in Missing Data Technique, EURASIP Journal on Applied Signal Processing :3, 340–346 ,2004



  • There are currently no refbacks.

Copyright (c) 2017 International Journal of Advanced Research in Computer Science