Download presentation
Presentation is loading. Please wait.
Published byBernard Maxwell Modified over 9 years ago
1
Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede
2
Executive Summary Utilize voice verification in a security application Interface with an electronic lock Be cost advantageous compared to other solutions
3
Points of Interest Problem Identification What are Biometrics? Constraints Project Layout Cost Analysis Gantt Chart Conclusion
4
Problem Identification What? Desire to control access to a secure room by means other than a traditional keycard or passcode Why? Traditional methods can be compromised
5
Biometrics Growing Field of Technology Identification of individuals Uses biological traits Examples: Retinal or Iris Scanning Fingerprints Facial Recognition
6
Applicable Biometrics Facial Recognition Time consuming Difficult to implement Accurate Voice Verification Quick Easier implementation Not as accurate
7
Voice Biometrics Speech Recognition Program as a stenographer Speech to text programs Speaker Verification Used in security Does not care what you say Concerned about the nature of your voice
8
Constraints Economic Utilize standard parts Limiting software developing packages Keep price competitive Manufacturability Utilize standard parts Sustainability Proper documentation Sufficiently commented code
9
Constraints cont. Health and Safety Debug for all feasible scenarios Manual override Political / Ethical Future – abuse of collected bio-data General scope: no concerns Environmental and Social No foreseen impact
10
Design Computer-driven Microphone Audio Processing Program Locking Mechanism
11
Block Diagram Interface / Power Supply Microphone Computer ID Electric Door Lock User System Admin.
12
Programming Language MATLAB A very diverse program written in C Many built in functions Intuitive interface Digital Signal Processing (DSP) applications
13
Voice Verification Program Voice Recorder Voiced/Unvoiced Detection Voice Analysis Testing
14
Voice Recorder Sampled at 11025Hz for 5 seconds Stored in WAV format Naming Convention Lower case letters First initial followed by last name Ex: tjonell.wav
15
Voiced/Unvoiced Detection Enhance voice sample with autocorrelation. Detect spoken portions using enhanced voice sample. Split voice sample into spoken portions only.
16
tjonell.wav with Autocorrelation
17
Voice Analysis Power Spectral Density (PSD) The concentration of power at specific frequencies. Formants Characteristic resonant region in the PSD of a sound.
18
Voice Testing Compare the relative locations of formants in each word. A weighted score is created. This is based upon how closely a person’s voice matches their reference sample.
19
bbash vs. brian2
20
bbash vs. tjonell
21
Lock Circuit
22
Text-based User Interface ******************************* * * * Welcome to the * * Hudat Security System * * * ******************************* Please begin by entering your user name: bbash When you are ready to begin, press any key and recite the passphrase slowly into the microphone. PROCESSING... Access granted. Welcome.
23
Cost Analysis
24
Gantt Chart
25
Conclusion Biometrics answer increased demand for security. Voice verification is very practical. MATLAB is ideal for this application. Lock circuit allows communication between program and a door lock.
26
Question & Answer Session
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.