Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede.

Slides:



Advertisements
Similar presentations
THAPAR POLYTECHNIC COLLEGE PATIALA BIKRAMVIR SINGH (E.C.E ) NISHANT SHARMA(E.C.E ) MICROCONTROLLER BASED DIGITAL CODE LOCK.
Advertisements

Voiceprint System Development Design, implement, test unique voiceprint biometric system Research Day Presentation, May 3 rd 2013 Rahul Raj (Team Lead),
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Chapter 5 Input and Output. What Is Input? What is input? p. 166 Fig. 5-1 Next  Input device is any hardware component used to enter data or instructions.
Automatic Data Capture Devices & Methods
AN OVERVIEW OF BIOMETRIC ATMs. WHY ? CONVENTIONAL ATMs -> BIOMETRIC ATMs Environmental Concerns Environmental Concerns Security Concerns Security Concerns.
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
By: Monika Achury and Shuchita Singh
Fig. 2 – Test results Personal Memory Assistant Facial Recognition System The facial identification system is divided into the following two components:
The Role of Computers in Surveillance ~ Katie Hatland.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Biometrics: Voice Recognition
Adapted from CTAE Resources Network PROFITT Curriculum Basic Computer Skills Module 1 Hardware.
© 2006, Cognizant Technology Solutions. All Rights Reserved. The information contained herein is subject to change without notice. Automation – How to.
Best Practices In Design Outcomes Of A Survey P. H. King, PhD, PE Joan Walker, PhD Vanderbilt University.
Karthiknathan Srinivasan Sanchit Aggarwal
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
IT Introduction to Information Technology CHAPTER 05 - INPUT.
OCR GCSE ICT DATA CAPTURE METHODS. LESSON OVERVIEW In this lesson you will learn about the various methods of capturing data.
Knowledge Base approach for spoken digit recognition Vijetha Periyavaram.
Group #18 Biometric Padlock. The Biometric Padlock Team Jim Turner Jerry Guzolik Sasant Nuthakki Blaise Kapombe Nathan Harris.
Overview of the Department’s ABET Criterion 3 Assessment Process.
Input Devices Manual and Automatic By Laura and Gracie.
Supervisor: Dr. Eddie Jones Electronic Engineering Department Final Year Project 2008/09 Development of a Speaker Recognition/Verification System for Security.
Cullen College of Engineering RFID-Based Solutions for Piping Technology Piping Tech & UH July, 2007.
Input Devices.  Identify audio and video input devices  List the function of the respective devices.
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 6 BIOMETRICS.
Voice Based Autonomous Access Control Terminals HEXIUM Technical Development Co., Ltd
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
Some Sub-Activities within Requirements Engineering 1.Prototyping 2.Requirements Documentation 3.Requirements Validation 4.Requirements Measurements 5.Requirements.
UNIT 8 Seminar.  According to Sanderson (2009), the Practice Partner is an electronic health record and practice management program for ambulatory practices.
Input By Hollee Smalley. What is Input? Input is any data or instructions entered into the memory of a computer.
Creating Web Documents alt attribute Good and bad uses of ‘multimedia’ Sound files Homework: Discuss with me AND post announcement of Project II. Forms.
Recognition of spoken and spelled proper names Reporter : CHEN, TZAN HWEI Author :Michael Meyer, Hermann Hild.
 Data or instructions entered into memory of computer  Input device is any hardware component used to enter data or instructions 2.
Manipulating data Data management: validation and verification.
Math 5 Professor Barnett Timothy G. McManus Anthony P. Pastoors.
Dustin House ∙ Chris Moorman John Mouser ∙ Brian Neill ∙ Jack Skinner Advisors: Dr. Juliet Hurtig Dr. John-David Yoder A Self-Tuning Acoustic Guitar.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
HOME ENHANCEMENT SUITE Daniel Sabo Nathan Irvin Allen Humphreys Will Bouchonnet.
Biometrics Authentication Technology
A growing problem with university classrooms is the inability to effectively and efficiently record classroom attendance. The solution to this problem.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
PRESENTATION ON BIOMETRICS
Biometric Technologies
UNIT 15 WEEK 3 CLASS 2 LESSON OVERVIEW Pete Lawrence BTEC National Diploma Organisational System Security.
Computer Basics SystemsViruses Alternative Input Speech.
ARTIFICIAL INTELLIGENCE FOR SPEECH RECOGNITION. Introduction What is Speech Recognition?  also known as automatic speech recognition or computer speech.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Designing a Voice Activated Compartmentalized Safe with Speech Processing using Matlab Final Presentation Amy Anderson Ernest Bryant Mike Joyner Collins.
Project 3 Presentation B. Ramamurthy. Directions Next few slides show you the MINIMUM standard needed for the presentation.
Topic 8 – Security Methods 1)TechMed scenario covers Security methods and devices, including biometrics In the scenario: Implied.
Biometric Technology Jordan Seaton CIS 320 WKU. Essay Questions Which industries would find biometric technology the most useful? Why?
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
Project Presentation Eoin Culhane Multi Channel Music Recognition for an Electric Guitar.
CS-EE 481 Spring Founder’s Day, 2006 University of Portland School of Engineering CMOS Digital Lock Authors Julie Barton-Smith Cory Johnson Jessica.
Automatic Data Capture  Process where many techniques are used to automatically collect data without need for manual entry. Manual entry has following.
XP Practical PC, 3e Chapter 14 1 Recording and Editing Sound.
Introduction to Input Devices. Input Devices Units that gather information and transform that information into a series of electronic signals for the.
Chapter 15 Recording and Editing Sound
Input Devices.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Comprehensive Design Review
Biometric technology.
A SEMINAR REPORT ON BIOMETRICS
Electronic Door Unlock with Face Recognition
FPGA Vinyl to Digital Converter (VDC)
Joint Application Development (JAD)
BY: Michael Etse and Maverick Fermill
Presentation transcript:

Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede

Executive Summary Utilize voice verification in a security application Interface with an electronic lock Be cost advantageous compared to other solutions

Points of Interest Problem Identification What are Biometrics? Constraints Project Layout Cost Analysis Gantt Chart Conclusion

Problem Identification What?  Desire to control access to a secure room by means other than a traditional keycard or passcode Why?  Traditional methods can be compromised

Biometrics Growing Field of Technology  Identification of individuals  Uses biological traits  Examples: Retinal or Iris Scanning Fingerprints Facial Recognition

Applicable Biometrics Facial Recognition  Time consuming  Difficult to implement  Accurate Voice Verification  Quick  Easier implementation  Not as accurate

Voice Biometrics Speech Recognition  Program as a stenographer Speech to text programs Speaker Verification  Used in security Does not care what you say Concerned about the nature of your voice

Constraints Economic  Utilize standard parts  Limiting software developing packages  Keep price competitive Manufacturability  Utilize standard parts Sustainability  Proper documentation  Sufficiently commented code

Constraints cont. Health and Safety  Debug for all feasible scenarios  Manual override Political / Ethical  Future – abuse of collected bio-data  General scope: no concerns Environmental and Social  No foreseen impact

Design Computer-driven Microphone Audio Processing Program Locking Mechanism

Block Diagram Interface / Power Supply Microphone Computer ID Electric Door Lock User System Admin.

Programming Language MATLAB  A very diverse program written in C  Many built in functions  Intuitive interface  Digital Signal Processing (DSP) applications

Voice Verification Program Voice Recorder Voiced/Unvoiced Detection Voice Analysis Testing

Voice Recorder Sampled at 11025Hz for 5 seconds Stored in WAV format Naming Convention  Lower case letters  First initial followed by last name  Ex: tjonell.wav

Voiced/Unvoiced Detection Enhance voice sample with autocorrelation. Detect spoken portions using enhanced voice sample. Split voice sample into spoken portions only.

tjonell.wav with Autocorrelation

Voice Analysis Power Spectral Density (PSD)  The concentration of power at specific frequencies. Formants  Characteristic resonant region in the PSD of a sound.

Voice Testing Compare the relative locations of formants in each word. A weighted score is created.  This is based upon how closely a person’s voice matches their reference sample.

bbash vs. brian2

bbash vs. tjonell

Lock Circuit

Text-based User Interface ******************************* * * * Welcome to the * * Hudat Security System * * * ******************************* Please begin by entering your user name: bbash When you are ready to begin, press any key and recite the passphrase slowly into the microphone. PROCESSING... Access granted. Welcome.

Cost Analysis

Gantt Chart

Conclusion Biometrics answer increased demand for security. Voice verification is very practical. MATLAB is ideal for this application. Lock circuit allows communication between program and a door lock.

Question & Answer Session