Professional Documents
Culture Documents
SRS of Project
SRS of Project
Version 1.0
i
Table of Contents
4. Usage Scenarios 5
5. Adopted Methodology 11
ii
SRS Document
Scope of Project:
Digital audio forensics, an interdisciplinary domain encompassing audio engineering,
signal processing, and artificial intelligence, focuses on the analysis and authentication of
audio recordings. This project aims to provide students with a comprehensive exploration
of digital audio forensics by incorporating advanced AI methodologies. The primary
objective is to develop and implement machine learning algorithms capable of
discriminating between authentic and modified audio samples.
Throughout the project, students will engage in practical tasks involving the manipulation
and analysis of audio data. The scope includes hands-on experience in recognizing
speech features, understanding the nuances of audio signals, and employing AI
techniques to enhance the accuracy of audio authentication. By immersing themselves in
this project, students will gain a profound understanding of the complexities involved in
verifying the authenticity of audio recordings.
Additionally, the scope extends to the exploration of various AI approaches such as deep
learning and pattern recognition to discern subtle alterations in audio files. Through this
interdisciplinary endeavor, students will not only acquire technical expertise but also
develop critical thinking skills as they navigate the intricate landscape of digital audio
forensics. The project's scope aligns with the broader goal of equipping students with
practical insights into AI applications within the context of audio analysis and forensic
investigation.
1
Functional and non-Functional Requirements:
Functional Requirements:
Non-functional requirements
2
event of a system failure, the recovery time objective (RTO) should be
less than 1 hour to minimize downtime.
o Security: User data, including uploaded audio clips and detection results,
should be stored securely with encryption and access controls to prevent
unauthorized access. Regular security audits and vulnerability assessments
should be conducted to identify and address potential security risks.
o Usability: The user interface should adhere to accessibility standards,
ensuring that it is usable by individuals with disabilities. User interface
elements should be responsive and optimized for various devices and
screen sizes.
o Maintainability: Code should be well-documented, and the system should
include version control to facilitate maintenance and updates. Routine
maintenance tasks, such as database backups and software updates, should
be automated to minimize downtime.
o Compatibility: The system should be compatible with major web
browsers (Chrome, Firefox, Safari, and Edge) and support the latest
versions. The application interface should be responsive and compatible
with various operating systems, including Windows, macOS, and Linux.
o Scalability: The neural network model should be designed to handle an
increasing volume of uploaded audio clips by efficiently utilizing
available computational resources. The model training process should be
scalable, allowing for the incorporation of additional training data to
improve detection accuracy over time.
o Legal and Ethical Considerations: The system should comply with
international and local laws regarding user privacy, data protection, and
the ethical use of machine learning algorithms. Ethical guidelines should
be established to mitigate biases in the detection process and ensure fair
and unbiased results.
o Training and Support: Comprehensive training materials should be
provided for system administrators and support staff to ensure effective
management and troubleshooting. A dedicated support channel should be
available for users to report issues and seek assistance, with a response
time target of 24 hours for non-critical issues.
3
Use Case Diagram(s):
4
Usage Scenarios:
5
3. Use Case: Initiates Detection Process (UC-03)
4. Use Case: View Detection Results for Real Audio Clip (UC-04)
6
5. Use Case: Detection Results for Suspected Fake Audio (UC-05)
7
Use Case ID UC-07
Use Case Title Provides Feedback on Suspected Fake Audio Detection
Actions User provides feedback on suspected fake audio
detection
Description User who has received results for a suspected fake
audio clip decides to provide feedback regarding the
accuracy of the detection.
Alternative Paths User can’t provide feedback.
Pre-Conditions User has received results for a suspected fake audio
clip
Post-Conditions User has posted the feedback.
Exceptions Option not available.
Author BC200414187
8
Actions Admin process the real audio clip received from user.
Description Admin processes a real audio clip using appropriate feature
extraction methods and machine learning algorithms to differentiat
between real and fake audio.
Alternative Paths Admin can cancel the action.
Pre-Conditions Admin received the real audio clip.
Post-Conditions Admin processed the real audio clip.
Author BC200414187
9
11.Use Case: Admin Processes Suspected Fake Audio Clip (UC-11)
10
Adopted Methodology
I. Waterfall Model:
The Waterfall model is a linear and sequential approach to software
development. It follows a structured process with distinct phases, where
each phase must be completed before moving to the next. The steps involved
in the Waterfall model are as follows:
11
Strengths of the Waterfall model include its straightforward and easy-to-
understand nature, as well as the ability to plan and estimate the project
upfront. However, its rigid structure may not accommodate changes well,
and any mistakes in earlier phases can be costly to rectify in later stages.
The Spiral model is well-suited for projects with high risk and evolving
requirements. It allows for early identification and mitigation of risks.
However, it can be complex to manage and may require experienced
personnel.
12
III. Agile Methodology:
Agile is an iterative and collaborative approach that emphasizes
adaptability and customer satisfaction. It promotes cross-functional teams
and regular customer involvement. The steps involved in Agile methodology
(specifically Scrum, a popular Agile framework) are as follows:
14
The Incremental model provides early delivery of usable software and
allows for flexibility in adjusting requirements. It enables continuous
feedback and improvements. However, managing dependencies between
increments can be challenging, and inadequate planning may result in
difficulties integrating the increments effectively.
15
Adopted Methodology:
16
modifications or improvements to be made in subsequent
iterations, ensuring continuous refinement and enhancement.
17
Work Plan (Use MS Project to create Schedule/Work Plan)
18