Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams...
-
Upload
bernard-maxwell -
Category
Documents
-
view
213 -
download
0
Transcript of Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams...
Speaker Verification System in a Security ApplicationHŪDAT Brian Bash
Thomas JonellDustin Williams
Advisor Dr. Les Thede
Executive Summary
Utilize voice verification in a security application
Interface with an electronic lock Be cost advantageous compared to other
solutions
Points of Interest
Problem Identification What are Biometrics? Constraints Project Layout Cost Analysis Gantt Chart Conclusion
Problem Identification
What?Desire to control access to a secure room by
means other than a traditional keycard or passcode
Why?Traditional methods can be compromised
Biometrics
Growing Field of Technology Identification of individualsUses biological traitsExamples:
Retinal or Iris Scanning Fingerprints Facial Recognition
Applicable Biometrics
Facial Recognition Time consuming Difficult to implement Accurate
Voice Verification Quick Easier implementation Not as accurate
Voice Biometrics
Speech Recognition Program as a stenographer
Speech to text programs
Speaker Verification Used in security
Does not care what you say Concerned about the nature of your voice
Constraints
Economic Utilize standard parts Limiting software developing packages Keep price competitive
Manufacturability Utilize standard parts
Sustainability Proper documentation Sufficiently commented code
Constraints cont.
Health and Safety Debug for all feasible scenarios Manual override
Political / Ethical Future – abuse of collected bio-data General scope: no concerns
Environmental and Social No foreseen impact
Design
Computer-driven Microphone Audio Processing Program Locking Mechanism
Block Diagram
Interface / Power Supply
Microphone Computer ID
Electric Door Lock
User
System Admin.
Programming Language
MATLABA very diverse program written in CMany built in functions Intuitive interfaceDigital Signal Processing (DSP) applications
Voice Verification Program
Voice Recorder Voiced/Unvoiced Detection Voice Analysis Testing
Voice Recorder
Sampled at 11025Hz for 5 seconds Stored in WAV format Naming Convention
Lower case lettersFirst initial followed by last nameEx: tjonell.wav
Voiced/Unvoiced Detection
Enhance voice sample with autocorrelation.
Detect spoken portions using enhanced voice sample.
Split voice sample into spoken portions only.
tjonell.wav with Autocorrelation
Voice Analysis
Power Spectral Density (PSD)The concentration of power at specific
frequencies. Formants
Characteristic resonant region in the PSD of a sound.
Voice Testing
Compare the relative locations of formants in each word.
A weighted score is created.This is based upon how closely a person’s
voice matches their reference sample.
bbash vs. brian2
bbash vs. tjonell
Lock Circuit
1
3 9
7
4 10
6 12
13119 16
468 1
2N2222Anpn BJT
10uF
120V AC60Hz
1N4001
IlluminatedRocker Switch
Low SignalRelay
Step-Down Transformer120VAC to 12.6VAC
SERIAL LINE (RS232)9 pin D-Type
LEEElectric
DoorStrike
8-16VAC3-6VDC
50 Ohm
2A Fuse
15AFuse
Text-based User Interface
******************************* * * * Welcome to the * * Hudat Security System * * * ******************************* Please begin by entering your user name: bbash When you are ready to begin, press any key and recitethe passphrase slowly into the microphone. PROCESSING... Access granted. Welcome.
Cost Analysis
Computer System $800MATLAB (reusable) $1,900MATLAB Signal Processing Toolbox (reusable) $800MATLAB Compiler (reusable) $2,700Lock & Components $100Development ($20/hr, 3 people) $28,800TOTAL $35,100
Break-Even MSRP (per unit) $450Profit MSRP (33% profit per unit) $600
Gantt Chart
Conclusion
Biometrics answer increased demand for security.
Voice verification is very practical. MATLAB is ideal for this application. Lock circuit allows communication
between program and a door lock.
Question & Answer Session