Itm Report Secret Keeper App1
Itm Report Secret Keeper App1
Submitted
By
Supervised by
Prof. Sonika Singh
Assistant Professor
Faculty of Engineering and Technology
ITM Vocational University, Vadodara
DECEMBER 2024
1
Telephone No. 2668-292840
DECLARATION
Project Title: Secret Keeper App
I give undertaking that this project report contains my own ideas and work in my own words. I
have adequately cited and listed other’s ideas or words in the reference materials. All the parts of
the report are prepared without any plagiarism. I have adhered to all principles of academic honesty
and integrity. No falsified or fabricated data have been presented in the thesis. I understand that
any violation of the above will cause for disciplinary action by the Institute, including revoking
the conferred degree, if conferred, and can also evoke penal action from the sources which have
not been properly cited or from whom proper permission has not been taken.
Date: / /
------------------------------------
KRISHNA BHATT
160110722077
------------------------------------
PATHIK BHATT
160110722008
----------------------------------
NIJ DONGA
160110722032
-------------------------------------
NIRMAL PARMAR
160110722026
2
CERTIFICATE
It is certified that the work contained in this project report entitled ‘Secret Keeper App’ submitted
by KRISHNA BHATT studying at ITM Vocational University for the award of BCA CTIS
(Faculty of Engineering and Technology) is absolutely based on their own work carried out under
my supervision and that this work has not been submitted elsewhere for any degree/diploma.
Guide
Prof. Sonika Singh
Assistant Professor
Faculty of Engineering and Technology
ITM Vocational University
Head of Department
Date:
Place:
3
COMPLIANCE CERTIFICATE
This is to certify that research work embodied in this project report entitled Secret Keeper App”
was carried out by KRISHNA BHATT at ITM Vocational University for partial fulfillment of Int
B. Tech degree to be awarded by ITM Vocational University. They had complied the comments
of the PROJECT –I, PROJECT – II, PROJECT – III, PROJECT – IV and PROJECT – V with my
satisfaction.
Date:
Place:
------------------------------------
KRISHNA BHATT
160110722077
------------------------------------
PATHIK BHATT
160110722008
----------------------------------
NIJ DONGA
160110722032
-------------------------------------
NIRMAL PARMAR
160110722026
4
PROJECT APPROVAL CERTIFICATE
This is to certify that Project work embodied in this project report entitled Secret Keeper App”
carried out by KRISHNA BHATT, PATHIK BHATT, NIJ DONGA, AND NIRMAL PARMAR,
at Faculty of Vocational professional & Interdisciplinary studies is approved for the degree of
BCA CTIS in Faculty of Engineering and Technology by ITM Vocational University, Vadodara.
Date:
Place:
1) _________________________________________
2)_________________________________________
5
Abstract
The Secret Keeper App is a secure data management application leveraging Machine Learning
(ML) and Natural Language Processing (NLP). It provides advanced features, including ML-based
facial recognition for authentication, OTP verification, AES encryption for data security, and NLP-
driven sentiment and entity analysis. With speech-to-text functionality and a Streamlit interface,
the app ensures seamless data input and accessibility. This project demonstrates the integration of
cutting-edge technologies to enhance data security, usability, and user insights. The report details
the app's conceptualization, methodology, implementation, and future scope, showcasing its
potential to redefine secure personal data management.
6
Acknowledgement
We express our heartfelt gratitude to all individuals and institutions who contributed to the success
of this project, Secret Keeper App.
First, we extend our deepest appreciation to our esteemed guide, Prof. Sonika Sinh, for her
invaluable guidance, constructive feedback, and unwavering support throughout this project. Her
mentorship has been instrumental in shaping our work and ensuring its successful completion.
We also thank the faculty and administration of ITM Vocational University for providing us with
the resources and opportunity to pursue this project as part of our semester coursework.
Finally, we extend our heartfelt gratitude to our families and friends for their constant
encouragement and support throughout this journey.
7
Table Of Contents
Sr. No. Content Page
Number
1 Cover Page 1
2 Declaration 2
3 Certificate 3
4 Compliance Certificate 4
5 Project Approval Certificate 5
6 Abstract 6
7 Acknowledgement 7
8 Table of Contents 8
9 List of Abbreviations 9
10 List of Figures 10
11 Chapter 1: Introduction 11
12 Chapter 2: Aim and Objectives of the study 16
13 Chapter 3: Review of Literature 20
14 Chapter 4: Methodology: Materials and Methods 25
15 Chapter 5: Observations, results, and Discussion 33
16 Chapter 6: Conclusions & Summary 38
Appendix 41
References 45
8
List of Abbreviations
9
List of Figures
10
Chapter 1
Introduction
In the rapidly evolving digital era, data security and privacy have become paramount concerns.
The increasing reliance on digital platforms for personal, financial, and professional tasks has
resulted in a surge in data breaches, identity thefts, and unauthorized access. Traditional security
mechanisms, such as passwords, are proving insufficient due to their susceptibility to hacking and
the challenges users face in managing complex credentials. This growing need for secure yet user-
friendly solutions has led to the integration of cutting-edge technologies such as Machine Learning
(ML) and Natural Language Processing (NLP).
The Secret Keeper App is conceptualized as a secure data management platform that addresses
these challenges. By leveraging ML-based facial recognition, the app offers robust and reliable
authentication mechanisms. Additionally, it integrates NLP-driven insights to help users better
understand and manage their data. With features like Advanced Encryption Standard (AES) for
data protection and speech-to-text capabilities for accessibility, the app provides a holistic
approach to secure and intelligent data management.
The reliance on traditional security methods like passwords or PINs exposes users to potential data
breaches and unauthorized access. Furthermore, users often lack tools to derive meaningful
insights from their stored data, limiting its usability and value. Existing solutions often fail to
address these issues comprehensively, either focusing on security without usability or vice versa.
There is a pressing need for an integrated solution that not only ensures robust security but also
offers advanced functionalities to enhance user experience and data management.
11
1.3 Importance and Relevance
The significance of this project lies in its ability to address critical gaps in data security and
usability:
1. Enhanced Security: By utilizing ML-based facial recognition and AES encryption, the
app ensures a secure environment for sensitive data.
The Secret Keeper App is designed primarily for individual users who require a secure yet
intuitive way to manage personal data. This includes people seeking to protect sensitive files,
passwords, and personal information while deriving actionable insights from their stored data.
The Secret Keeper App is designed to cater to a wide range of personal use cases, including:
• Digital Diary and Journaling: Enabling users to analyze their journal entries for
sentiment insights and keyword tracking.
• Document Storage and Protection: Providing secure storage for important documents
like IDs, financial statements, or academic records.
12
• Data-Driven Insights: Using NLP to help users understand patterns in their stored data,
such as identifying recurring sentiments in journal entries or trends in daily logs.
The app’s modular architecture ensures scalability, enabling future integration of additional
features such as multi-language support, cloud-based storage, and extended biometric
authentication methods.
The Secret Keeper App stands out from other data management applications due to its integration
of multiple advanced technologies, including:
o AES encryption protects sensitive user data, making it nearly impossible for
unauthorized access.
o Features like sentiment analysis help users understand their emotional patterns over
time.
o Entity extraction highlights key terms and topics in their stored text data.
o Speech-to-text functionality ensures that users can easily add data, even on the go.
13
o The Streamlit-based user interface provides an intuitive experience, making it
accessible for people with varying technical expertise.
o The app’s modular design allows for future updates and enhancements without
disrupting the core functionality.
o Users can customize their experience by choosing which features to enable based
on their preferences.
These innovations make the Secret Keeper App a unique and powerful tool for personal data
management, merging security, intelligence, and ease of use.
• Chapter 2: Explains the aim and objectives of the project, along with the specific research
questions it addresses.
• Chapter 3: Provides a comprehensive review of the literature related to data security, ML,
and NLP technologies.
• Chapter 4: Details the methodology used in the development of the app, including system
architecture, tools, and techniques.
• Chapter 5: Presents the observations, results, and discussions based on the implementation
and testing of the app.
• Chapter 6: Summarizes the findings, draws conclusions, and suggests directions for future
work.
14
• Appendix: Includes supplementary materials such as diagrams, code snippets, and
screenshots to provide additional context.
15
Chapter 2
The primary aim of this study is to design and develop a secure, user-friendly application (Secret
Keeper App) that leverages advanced technologies such as Machine Learning (ML) and Natural
Language Processing (NLP). The app aims to provide robust security for sensitive data,
meaningful insights into user data, and improved accessibility for individuals managing their
personal information.
To achieve the stated aim, the study focuses on the following key objectives:
o Employ AES encryption for safeguarding sensitive user data against unauthorized
access.
o Utilize NLP techniques, such as sentiment analysis and entity extraction, to provide
users with meaningful insights into their stored text data.
o Enable users to analyze their emotional patterns and key topics through
visualizations and summaries.
16
3. Improved Accessibility:
o Design an intuitive user interface (UI) using Streamlit for ease of use across
different technical expertise levels.
o Develop a modular architecture that supports the addition of new features, such as
multi-language support or cloud-based storage, without disrupting the core
functionality.
o Ensure the app can scale to accommodate a growing user base and evolving user
needs.
5. Real-Time Usability:
o How can Machine Learning enhance the accuracy and reliability of facial
recognition for authentication?
17
o Which NLP techniques are most effective for analyzing user data in terms of
sentiment and entity recognition?
o How can the app present insights in a way that is meaningful and actionable for
users?
o What features can make the app accessible and user-friendly for individuals with
varying technical expertise?
o How can the app’s architecture support future scalability and integration of
additional features?
1. Individual Users:
o The app is designed specifically for individuals looking to manage their personal
data securely and effectively.
o The core features include facial recognition, OTP verification, AES encryption,
NLP-based data insights, and speech-to-text functionality.
3. Technological Implementation:
o The project employs Python libraries such as OpenCV, Dlib, Spacy, and TextBlob,
as well as encryption techniques like AES for robust data security.
19
Chapter 3
Review of Literature
The digital transformation has amplified the importance of secure data storage and management.
Traditional methods such as password-based systems have proven inadequate against sophisticated
hacking techniques, including phishing and brute-force attacks. Researchers have explored the
following trends to address these challenges:
1. Biometric Authentication:
2. Encryption Mechanisms:
20
o Research has shown that combining encryption with multi-factor authentication
enhances overall security.
3. Emerging Threats:
21
3.4 Natural Language Processing for Data Insights
NLP has emerged as a powerful tool for extracting insights from unstructured text data. The
literature identifies several applications of NLP in personal and professional contexts:
1. Sentiment Analysis:
o Research highlights the use of tools like TextBlob and Spacy for determining the
sentiment polarity (positive, negative, neutral) of text data.
2. Entity Recognition:
o Named Entity Recognition (NER) is a widely studied NLP task for identifying key
entities, such as names, dates, and locations, within text.
o Literature emphasizes the use of pre-trained models for achieving high accuracy in
entity extraction tasks.
o NLP enables users to categorize, summarize, and analyze large volumes of text data
effectively.
o Studies show that visualizations, such as sentiment graphs or word clouds, improve
user engagement and understanding.
Integrating ML and NLP technologies into a single application offers immense potential for
creating intelligent and secure systems. Key findings include:
22
o ML enhances the performance of NLP tasks by enabling advanced techniques such
as contextual embeddings (e.g., BERT and GPT models).
o NLP, in turn, adds value to ML-based systems by providing textual insights and
context-aware features.
2. User-Centric Design:
3. Case Studies:
o InsightVault: A data analysis tool with sentiment and entity recognition but
without advanced authentication mechanisms.
The Secret Keeper App builds on these studies by integrating ML-based security with NLP-driven
data insights into a single, user-friendly platform.
1. Limited integration of advanced security and data analysis features in a single platform.
These gaps underscore the need for the Secret Keeper App, which combines ML, NLP, and
encryption technologies into a secure, scalable, and user-friendly system.
23
3.7 Conclusion
The literature reviewed in this chapter highlights the potential and challenges of integrating ML
and NLP for secure data management. By addressing the gaps identified, the Secret Keeper App
aims to provide a holistic solution that prioritizes security, usability, and intelligent insights.
24
Chapter 4
4.1 Introduction
This chapter details the methodology used in the development of the Secret Keeper App, including
the research design, technologies employed, data collection methods, and implementation
processes. The primary focus is on the integration of Machine Learning (ML) and Natural
Language Processing (NLP) techniques with a modular architecture to achieve the app’s
objectives.
The Secret Keeper App is designed using a modular architecture to ensure scalability,
maintainability, and flexibility.
1. Frontend:
o The user interface (UI) is built using Streamlit, a Python-based web framework
that provides an interactive and user-friendly experience.
2. Backend:
o Data storage and management are handled using MySQL, ensuring efficient
handling of user data and logs.
25
o The ML module is responsible for facial recognition and authentication.
o The NLP module handles sentiment analysis and entity recognition using libraries
such as Spacy and TextBlob.
4. Data Security:
To achieve the objectives of the project, the following tools and technologies are used:
Technology Purpose
Spacy and
NLP libraries for sentiment analysis and entity recognition.
TextBlob
26
4.4 Development Workflow
The development process for the Secret Keeper App follows an iterative approach to ensure
functionality and usability at each stage:
1. Requirement Analysis:
2. System Design:
o Designed the modular architecture with clearly defined components for frontend,
backend, and ML/NLP modules.
27
3. Implementation:
o Authentication:
o Data Insights:
28
Fig. 4.3 Sentiment Analysis Visualization Diagram
▪ The SpeechRecognition library was used to enable seamless voice input for
data entry.
o Encryption:
▪ AES encryption was applied to secure sensitive data stored in the database.
5. Deployment:
o Deployed the app locally for testing and collected feedback to refine features and
address bugs.
To test and evaluate the app’s functionalities, simulated datasets and user inputs were used:
30
1. Facial Recognition Testing:
o Used publicly available facial image datasets to train and test the facial recognition
model.
o Evaluated accuracy under varying conditions such as lighting and face angles.
2. NLP Features:
o Tested sentiment analysis and entity recognition using pre-labeled text datasets.
o Real user-generated text (e.g., journal entries) was used to simulate real-world
usage.
3. User Feedback:
o Collected feedback from a small group of users during the testing phase to identify
usability issues and improve the app’s interface and functionalities.
The success of the app’s core functionalities was measured using the following metrics:
31
1. Low-Light Performance in Facial Recognition:
2. Speech-to-Text Accuracy:
o Solution: AES encryption was used for secure data storage, and user data was
anonymized during testing phases.
4.8 Conclusion
This chapter outlined the methodologies, tools, and techniques used in developing the Secret
Keeper App. By leveraging a modular architecture and advanced technologies, the app achieves
its objectives of secure authentication, insightful data analysis, and enhanced user accessibility.
The following chapter will present the results and observations from testing and implementation.
32
Chapter 5
This chapter presents the findings from the implementation and testing of the Secret Keeper App.
Observations are made regarding the performance of its core functionalities, including facial
recognition, sentiment analysis, entity recognition, and speech-to-text capabilities. The results are
analyzed in light of the objectives set in Chapter 2, and the implications of the findings are
discussed.
5.2 Observations
• The ML-based facial recognition system achieved high accuracy under standard
conditions.
• Observations revealed challenges in low-light environments or when the user's face was
partially obscured.
• Authentication Time: Average processing time for facial recognition was recorded at 1.2
seconds, ensuring a seamless user experience.
• Accuracy: Sentiment classification accuracy averaged 87%, surpassing the target metric
of 85%.
33
5.2.3 Entity Recognition
• Entity recognition using Spacy identified key entities such as names, locations, and dates
with 82% accuracy.
5.2.4 Speech-to-Text
• Speech-to-text functionality successfully transcribed spoken words into text with 88%
accuracy in quiet environments.
• A survey conducted with 10 test users revealed a satisfaction score of 8.5/10, indicating
positive reception of the app’s UI.
• Feedback: Users appreciated the intuitive design and ease of navigating between features.
5.3 Results
Observed Target
Feature Evaluation Metric Performance
Value Value
34
Observed Target
Feature Evaluation Metric Performance
Value Value
User Interface
User Satisfaction (Score) 8.5/10 ≥ 8/10 Achieved
Usability
These results demonstrate that the app successfully met or exceeded the target metrics for all core
functionalities.
5.4 Discussion
• Strengths:
o AES encryption effectively secured sensitive data, aligning with the project’s
security objectives.
• Limitations:
• Sentiment Analysis:
35
o The sentiment analysis module delivered high accuracy but struggled with
ambiguous or sarcastic text. Future iterations could explore advanced models like
BERT for context-aware analysis.
• Entity Recognition:
o Entity extraction performed well on structured text but could be improved for
informal data using fine-tuned NLP models.
• Speech-to-text functionality enhanced the app’s accessibility but required users to operate
in quiet environments for optimal performance. Enhancing the noise reduction algorithms
could address this limitation.
• Users highlighted the app’s intuitive interface as a major strength, validating the design
approach taken during development.
• The app’s modular design proved effective, as it allowed easy integration of core features
while maintaining overall performance.
o The Secret Keeper App stands out for its integration of security (ML-based
authentication and AES encryption) with intelligent insights (sentiment analysis
and entity recognition).
36
5.5 Key Takeaways
1. The Secret Keeper App effectively combines advanced technologies to provide a secure,
user-friendly data management platform.
2. All core functionalities performed at or above the target metrics, demonstrating the app’s
reliability and usability.
3. Areas for improvement include refining facial recognition for low-light conditions and
enhancing NLP modules for informal text.
5.6 Conclusion
The observations and results validate the Secret Keeper App as a viable solution for secure and
intelligent personal data management. The positive feedback and high accuracy metrics achieved
across features highlight the app’s potential for real-world applications. The next chapter will
summarize the study’s findings, conclusions, and recommendations for future work.
37
Chapter 6
38
6.3 Conclusions
The Secret Keeper App demonstrates the feasibility and effectiveness of integrating ML, NLP, and
encryption technologies into a single platform for secure data management. The study concludes
that:
1. ML-based facial recognition provides a reliable and user-friendly authentication
mechanism.
2. NLP features add value by enabling users to extract actionable insights from their data.
3. Accessibility features, such as speech-to-text, make the app inclusive and user-centric.
4. The modular design ensures the app is adaptable to evolving user needs and technological
advancements.
Overall, the app addresses the gaps identified in existing solutions, offering a comprehensive and
scalable approach to personal data management.
6.4 Limitations
While the app performed well, a few limitations were observed:
1. Facial Recognition:
o Performance declined under low-light conditions, highlighting the need for
enhanced preprocessing techniques or alternative imaging technologies like
infrared.
2. NLP Features:
o The sentiment analysis struggled with ambiguous or sarcastic text, which could be
improved using advanced context-aware models like BERT.
3. Speech-to-Text:
o Transcription accuracy was impacted by background noise, requiring further
refinement in noise reduction algorithms.
39
o Incorporate deep learning models for facial recognition to improve accuracy in
challenging conditions (e.g., low light, occlusions).
o Explore multi-modal biometric authentication by integrating fingerprint or voice
recognition.
2. Enhanced NLP Features:
o Fine-tune sentiment analysis and entity recognition using pre-trained models like
BERT or GPT for better accuracy with informal text.
o Add multi-language support to cater to a diverse user base.
3. Cloud Integration:
o Transition to a cloud-based storage system to enable real-time access and
scalability.
o Implement cloud-based backup and recovery to prevent data loss.
4. Mobile App Development:
o Develop a mobile version of the Secret Keeper App to increase accessibility and
usability on smartphones and tablets.
5. Ethical Considerations and Compliance:
o Ensure compliance with data privacy regulations, such as GDPR, to address ethical
concerns and build user trust.
40
Appendix
41
A2. Main Dashboard
• Description: This is the main dashboard where users can enter, view,
and manage their data securely.
42
A3. Sentiment Analysis and Visualization
• Description: Shows the visualization of sentiment trends over time,
helping users understand patterns in their data.
43
44
REFERENCES
1. Brown, A., & Smith, J. (2021). Integrating ML and NLP in Data Security Applications.
Journal of Applied Security, 14(2), 123-136.
2. "Spacy NLP Documentation," [online]. Available: https://spacy.io/usage
3. "SpeechRecognition Library Documentation," [online]. Available:
https://pypi.org/project/SpeechRecognition/
4. Python Software Foundation. (2023). Python 3.10 Documentation.
5. "MySQL Database Management," [online]. Available: https://www.mysql.com
45