Presentation is loading. Please wait.

Presentation is loading. Please wait.

Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede.

Similar presentations


Presentation on theme: "Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede."— Presentation transcript:

1 Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede

2 Executive Summary Utilize voice verification in a security application Interface with an electronic lock Be cost advantageous compared to other solutions

3 Points of Interest Problem Identification What are Biometrics? Constraints Project Layout Cost Analysis Gantt Chart Conclusion

4 Problem Identification What?  Desire to control access to a secure room by means other than a traditional keycard or passcode Why?  Traditional methods can be compromised

5 Biometrics Growing Field of Technology  Identification of individuals  Uses biological traits  Examples: Retinal or Iris Scanning Fingerprints Facial Recognition

6 Applicable Biometrics Facial Recognition  Time consuming  Difficult to implement  Accurate Voice Verification  Quick  Easier implementation  Not as accurate

7 Voice Biometrics Speech Recognition  Program as a stenographer Speech to text programs Speaker Verification  Used in security Does not care what you say Concerned about the nature of your voice

8 Constraints Economic  Utilize standard parts  Limiting software developing packages  Keep price competitive Manufacturability  Utilize standard parts Sustainability  Proper documentation  Sufficiently commented code

9 Constraints cont. Health and Safety  Debug for all feasible scenarios  Manual override Political / Ethical  Future – abuse of collected bio-data  General scope: no concerns Environmental and Social  No foreseen impact

10 Design Computer-driven Microphone Audio Processing Program Locking Mechanism

11 Block Diagram Interface / Power Supply Microphone Computer ID Electric Door Lock User System Admin.

12 Programming Language MATLAB  A very diverse program written in C  Many built in functions  Intuitive interface  Digital Signal Processing (DSP) applications

13 Voice Verification Program Voice Recorder Voiced/Unvoiced Detection Voice Analysis Testing

14 Voice Recorder Sampled at 11025Hz for 5 seconds Stored in WAV format Naming Convention  Lower case letters  First initial followed by last name  Ex: tjonell.wav

15 Voiced/Unvoiced Detection Enhance voice sample with autocorrelation. Detect spoken portions using enhanced voice sample. Split voice sample into spoken portions only.

16 tjonell.wav with Autocorrelation

17 Voice Analysis Power Spectral Density (PSD)  The concentration of power at specific frequencies. Formants  Characteristic resonant region in the PSD of a sound.

18 Voice Testing Compare the relative locations of formants in each word. A weighted score is created.  This is based upon how closely a person’s voice matches their reference sample.

19 bbash vs. brian2

20 bbash vs. tjonell

21 Lock Circuit

22 Text-based User Interface ******************************* * * * Welcome to the * * Hudat Security System * * * ******************************* Please begin by entering your user name: bbash When you are ready to begin, press any key and recite the passphrase slowly into the microphone. PROCESSING... Access granted. Welcome.

23 Cost Analysis

24 Gantt Chart

25 Conclusion Biometrics answer increased demand for security. Voice verification is very practical. MATLAB is ideal for this application. Lock circuit allows communication between program and a door lock.

26 Question & Answer Session


Download ppt "Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede."

Similar presentations


Ads by Google