SlideShare a Scribd company logo
1 of 19
VOICE IDENTIFICATION AND
RECOGNITION SYSTEM
A SIMPLE YET COMPLEX APPROACH TO MODERN SOPHISTICATION
VOICE IDENTIFICATION AND RECOGNITION SYSTEM 1
GROUP MEMBERS
• SOHAIB TALLAT SP13-BCE-040
• FARHAN SHAHID SP13-BCE-013
• ABDUL SAMAD SP13-BCE-002
• MATTI ULLAH ABBASI SP13-BCE-025
VOICE IDENTIFICATION AND RECOGNITION SYSTEM 2
INTRODUCTION AND INSPIRATION
• As we know that simplicity has taken its tool, it is now the age of sophisticated technologies therefore
nowadays efficient security systems have to be utilised in our life.
• The “VOICE IDENTIFICATION AND RECOGNITION SYSTEM” has been developed to cater our needs for
controlling access to services such as: banking, databases systems etc. which are used to secure
confidential information.
• We were inspired to make this project for making lock mechanism systems speech automated,
especially for the ease of physically disabled people.
VOICE IDENTIFICATION AND RECOGNITION SYSTEM 3
ABSTRACT
• Approaches for making Voice recognition sytems:
a. Linear Prediction Coding (LPC)
b. Mel-Frequecy Cepstrum Coefficients (MFCC) and others.
• Principle Used: Mel-Frequecy Cepstrum Coefficients (MFCC)
• Working
VOICE IDENTIFICATION AND RECOGNITION SYSTEM 4
THE VOICE IDENTIFICATION ALGORITHM
• Priciples of Speaker Recognition:
a. Identification
b. Verification
Input
speech
Feature
extraction
Reference
model
(Speaker #1)
Similarity
Reference
model
(Speaker #N)
Similarity
Maximum
selection
Identification
result
(Speaker ID)
Reference
model
(Speaker #M)
Similarity
Input
speech
Feature
extraction
Verification
result
(Accept/Reject)
Decision
ThresholdSpeaker ID
(#M)
VOICE IDENTIFICATION AND RECOGNITION SYSTEM 5
Figure 1: Speaker Identification
Figure 2: Speaker Recognition
FEATURE EXTRACTION
• Feature extraction is the process that extracts a small amount of data from the voice signal that can
later be used to represent each speaker.
• A wide range of possibilities exist for parametrically representing the speech signal for the speaker
recognition task, such as Mel Frequency Cepstrum Coefficients (MFCC).
0 0.002 0.004 0.006 0.008 0.01 0.012 0.014 0.016 0.018
-0.5
-0.4
-0.3
-0.2
-0.1
0
0.1
0.2
0.3
0.4
0.5
Time (second)
VOICE IDENTIFICATION AND RECOGNITION SYSTEM 6
Figure 3: Example Of Speech Signal
MEL-FREQUENCY CEPSTRUM COEFFICIENTS (MFCC)
PROCESSOR
mel
cepstrum
mel
spectrum
framecontinuous
speech
Frame
Blocking
Windowing FFT spectrum
Mel-frequency
Wrapping
Cepstrum
VOICE IDENTIFICATION AND RECOGNITION SYSTEM 7
MFCC PROCESSOR ELABORATED
• Frame Blocking
• Windowing
• Fast Fourier Transform
• Mel- Frequency Wrapping
• Cepstrum
0 1000 2000 3000 4000 5000 6000 7000
0
0.2
0.4
0.6
0.8
1
1.2
1.4
1.6
1.8
2
Mel-spaced filterbank
Frequency (Hz)
VOICE IDENTIFICATION AND RECOGNITION SYSTEM 8
Figure 4: Example of mel-spaced
frequency bank
FEATURE MATCHING
• Feature matching involves the actual procedure to identify the unknown speaker by comparing
extracted features from his/her voice input with the ones from a set of known speakers
• The goal of pattern recognition is to classify objects of interest into one of a number of categories or
classes.
• The objects of interest are called patterns and in our case are sequences of acoustic vectors that are
extracted from an input speech.
• Classes are referred to individual speakers.
VOICE IDENTIFICATION AND RECOGNITION SYSTEM 9
PATTERN RECOGNITION TECHNIQUE
• Feature matching technique used in “VOICE IDENTIFICATION AND RECOGNITION SYSTEM” is Vector
Quantization (VQ).
• VQ is a process of mapping vectors from a large vector space to a finite number of regions in that space.
Each region is called a cluster and can be represented by its center called a codeword. The collection of
all codewords is called a codebook.
VOICE IDENTIFICATION AND RECOGNITION SYSTEM 10
RECOGNITION PROCESS
VOICE IDENTIFICATION AND RECOGNITION SYSTEM 11
Speaker 1
Speaker 1
centroid
sample
Speaker 2
centroid
sample
Speaker 2
VQ distortion
Figure 5: Conceptual Diagram Illustrating Vector
Quantization codebook Formation
LINDE-BUZO-GREY ALGORITHM
The Linde–Buzo–Gray algorithm (introduced by Yoseph Linde,
Andrés Buzo and Robert M. Gray in 1980) is a vector quantization
algorithm to derive a good codebook.
VOICE IDENTIFICATION AND RECOGNITION SYSTEM 12
Find
centroid
Split each
centroid
Cluster
vectors
Find
centroids
Compute D
(distortion)


D
D'D
Stop
D’ = D
m = 2*m
No
Yes
Yes
No
m < M
THE GRAPHICAL USER INTERFACE
• There are many ways to make your own custom Graphical User Interface (GUI); you can do it manually
or you can use another efficient approach that is the “Guide” approach.
VOICE IDENTIFICATION AND RECOGNITION SYSTEM 13
Figure 6: Guide Quick Start Window
Figure 7: Our Custom GUI
EMBEDDING CODE TO THE GUI
• Note that in the figure we have six essential buttons, which perform their unique task.
a. “Add New Sound To The Database”
b. “Speaker Recognition From Mike”
c. “DATABASE INFORMATION”
d. “PLOT DATABASE”
e. “Delete Database”
f. “EXIT”
VOICE IDENTIFICATION AND RECOGNITION SYSTEM 14
Figure 7: Our Custom GUI
ADDING BACK GROUND TO THE GUI
CODE:
% create an axes that spans the whole gui
ah = axes('unit', 'normalized', 'position', [0 0 1 1]);
% import the background image and show it on the axes
bg = imread('project image 3.jpg'); imagesc(bg);
% prevent plotting over the background and turn the axis off
set(ah,'handlevisibility','off','visible','off')
% making sure the background is behind all the other uicontrols
uistack(ah, 'bottom');
VOICE IDENTIFICATION AND RECOGNITION SYSTEM 15
Figure 8: Our Custom Background
VOICE IDENTIFICATION AND RECOGNITION SYSTEM 16
Figure 9: Our Final Program
APPLICATION DEPLOYMENT
VOICE IDENTIFICATION AND RECOGNITION SYSTEM 17
Figure 10: Standalone application deployment window Figure 11: Our Custom Splash screen
REFERENCES
• L.R. Rabiner and B.H. Juang, Fundamentals of Speech Recognition, Prentice-Hall, Englewood Cliffs, N.J., 1993.
• S.B. Davis and P. Mermelstein, “Comparison of parametric representations for monosyllabic word recognition
in continuously spoken sentences”, IEEE Transactions on Acoustics, Speech, Signal Processing, Vol. ASSP-28,
No. 4, August 1980
• Y. Linde, A. Buzo & R. Gray, “An algorithm for vector quantizer design”, IEEE Transactions on Communications,
Vol. 28, pp.84-95, 1980
• S. Furui, “Speaker independent isolated word recognition using dynamic features of speech spectrum”, IEEE
Transactions on Acoustic, Speech, Signal Processing, Vol. ASSP-34, No. 1, pp. 52-59, February 1986
• F.K. Song, A.E. Rosenberg and B.H. Juang, “A vector quantisation approach to speaker recognition”, AT&T
Technical Journal, Vol. 66-2, pp. 14-26, March 1987
• comp.speech Frequently Asked Questions WWW site,
http://svr-www.eng.cam.ac.uk/comp.speech/
VOICE IDENTIFICATION AND RECOGNITION SYSTEM 18
Voice Identification And Recognition System, Matlab

More Related Content

What's hot

Audio watermarking
Audio watermarkingAudio watermarking
Audio watermarkingLikan Patra
 
Face Recognition System
Face Recognition SystemFace Recognition System
Face Recognition SystemStudentRocks
 
Home automation
Home automationHome automation
Home automationahmkashwa
 
What is Naïve Bayes Classification and How is it Used for Enterprise Analysis?
What is Naïve Bayes Classification and How is it Used for Enterprise Analysis?What is Naïve Bayes Classification and How is it Used for Enterprise Analysis?
What is Naïve Bayes Classification and How is it Used for Enterprise Analysis?Smarten Augmented Analytics
 
M.TECH 1ST SEM COMPUTER SCIENCE ADBMS LAB PROGRAMS
M.TECH 1ST SEM COMPUTER SCIENCE ADBMS LAB PROGRAMSM.TECH 1ST SEM COMPUTER SCIENCE ADBMS LAB PROGRAMS
M.TECH 1ST SEM COMPUTER SCIENCE ADBMS LAB PROGRAMSSupriya Radhakrishna
 
Speech recognition
Speech recognitionSpeech recognition
Speech recognitionCharu Joshi
 
Face detection ppt
Face detection pptFace detection ppt
Face detection pptPooja R
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesPrabh Jeet
 
SPEECH BASED EMOTION RECOGNITION USING VOICE
SPEECH BASED  EMOTION RECOGNITION USING VOICESPEECH BASED  EMOTION RECOGNITION USING VOICE
SPEECH BASED EMOTION RECOGNITION USING VOICEVamshidharSingh
 
Face recognition tech1
Face recognition tech1Face recognition tech1
Face recognition tech1Ankit Gupta
 
Silent sound-technology ppt final
Silent sound-technology ppt finalSilent sound-technology ppt final
Silent sound-technology ppt finalLohit Dalal
 
EEG Based Classification of Emotions with CNN and RNN
EEG Based Classification of Emotions with CNN and RNNEEG Based Classification of Emotions with CNN and RNN
EEG Based Classification of Emotions with CNN and RNNijtsrd
 
Detection of Parkinson’s disease using python.pptx
Detection of Parkinson’s disease using python.pptxDetection of Parkinson’s disease using python.pptx
Detection of Parkinson’s disease using python.pptxRashmiPrakash38
 
Electronic' skin monitors heart, brain function
Electronic' skin monitors heart, brain functionElectronic' skin monitors heart, brain function
Electronic' skin monitors heart, brain functioncmr cet
 

What's hot (20)

Agent Oriented Programming PPT
Agent Oriented Programming PPTAgent Oriented Programming PPT
Agent Oriented Programming PPT
 
Audio watermarking
Audio watermarkingAudio watermarking
Audio watermarking
 
Emotion recognition
Emotion recognitionEmotion recognition
Emotion recognition
 
Face Recognition System
Face Recognition SystemFace Recognition System
Face Recognition System
 
Home automation
Home automationHome automation
Home automation
 
What is Naïve Bayes Classification and How is it Used for Enterprise Analysis?
What is Naïve Bayes Classification and How is it Used for Enterprise Analysis?What is Naïve Bayes Classification and How is it Used for Enterprise Analysis?
What is Naïve Bayes Classification and How is it Used for Enterprise Analysis?
 
Voice recognition
Voice recognitionVoice recognition
Voice recognition
 
M.TECH 1ST SEM COMPUTER SCIENCE ADBMS LAB PROGRAMS
M.TECH 1ST SEM COMPUTER SCIENCE ADBMS LAB PROGRAMSM.TECH 1ST SEM COMPUTER SCIENCE ADBMS LAB PROGRAMS
M.TECH 1ST SEM COMPUTER SCIENCE ADBMS LAB PROGRAMS
 
Speech recognition
Speech recognitionSpeech recognition
Speech recognition
 
Face detection ppt
Face detection pptFace detection ppt
Face detection ppt
 
Private Branch Exchange
Private Branch ExchangePrivate Branch Exchange
Private Branch Exchange
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
SPEECH BASED EMOTION RECOGNITION USING VOICE
SPEECH BASED  EMOTION RECOGNITION USING VOICESPEECH BASED  EMOTION RECOGNITION USING VOICE
SPEECH BASED EMOTION RECOGNITION USING VOICE
 
Face recognition tech1
Face recognition tech1Face recognition tech1
Face recognition tech1
 
Silent sound-technology ppt final
Silent sound-technology ppt finalSilent sound-technology ppt final
Silent sound-technology ppt final
 
Data structure design in SE
Data structure  design in SEData structure  design in SE
Data structure design in SE
 
EEG Based Classification of Emotions with CNN and RNN
EEG Based Classification of Emotions with CNN and RNNEEG Based Classification of Emotions with CNN and RNN
EEG Based Classification of Emotions with CNN and RNN
 
Detection of Parkinson’s disease using python.pptx
Detection of Parkinson’s disease using python.pptxDetection of Parkinson’s disease using python.pptx
Detection of Parkinson’s disease using python.pptx
 
Skinput technology
Skinput technologySkinput technology
Skinput technology
 
Electronic' skin monitors heart, brain function
Electronic' skin monitors heart, brain functionElectronic' skin monitors heart, brain function
Electronic' skin monitors heart, brain function
 

Viewers also liked

Workshop geweld tegen meisjes
Workshop geweld tegen meisjesWorkshop geweld tegen meisjes
Workshop geweld tegen meisjesnobnob
 
Speaker identification system with voice controlled functionality
Speaker identification system with voice controlled functionalitySpeaker identification system with voice controlled functionality
Speaker identification system with voice controlled functionalityarizhamid786
 
The PEACE Model of Investigative Interviewing
The PEACE Model of Investigative InterviewingThe PEACE Model of Investigative Interviewing
The PEACE Model of Investigative InterviewingDaren Jay
 
85 business analyst interview questions and answers
85 business analyst interview questions and answers85 business analyst interview questions and answers
85 business analyst interview questions and answersBusinessAnalyst247
 
8 Free Types of Marketing Strategies
8 Free Types of Marketing Strategies8 Free Types of Marketing Strategies
8 Free Types of Marketing StrategiesBrian Downard
 

Viewers also liked (7)

Workshop geweld tegen meisjes
Workshop geweld tegen meisjesWorkshop geweld tegen meisjes
Workshop geweld tegen meisjes
 
Speaker identification system with voice controlled functionality
Speaker identification system with voice controlled functionalitySpeaker identification system with voice controlled functionality
Speaker identification system with voice controlled functionality
 
EDI 2009- Admissibility of Electronic/Digital Evidence
EDI 2009- Admissibility of Electronic/Digital EvidenceEDI 2009- Admissibility of Electronic/Digital Evidence
EDI 2009- Admissibility of Electronic/Digital Evidence
 
The PEACE Model of Investigative Interviewing
The PEACE Model of Investigative InterviewingThe PEACE Model of Investigative Interviewing
The PEACE Model of Investigative Interviewing
 
Types of questions
Types of questionsTypes of questions
Types of questions
 
85 business analyst interview questions and answers
85 business analyst interview questions and answers85 business analyst interview questions and answers
85 business analyst interview questions and answers
 
8 Free Types of Marketing Strategies
8 Free Types of Marketing Strategies8 Free Types of Marketing Strategies
8 Free Types of Marketing Strategies
 

Similar to Voice Identification And Recognition System, Matlab

Utterance based speaker identification
Utterance based speaker identificationUtterance based speaker identification
Utterance based speaker identificationIJCSEA Journal
 
Voice recognition security systems
Voice recognition security systemsVoice recognition security systems
Voice recognition security systemsSandeep Kumar
 
Utterance Based Speaker Identification Using ANN
Utterance Based Speaker Identification Using ANNUtterance Based Speaker Identification Using ANN
Utterance Based Speaker Identification Using ANNIJCSEA Journal
 
Utterance Based Speaker Identification Using ANN
Utterance Based Speaker Identification Using ANNUtterance Based Speaker Identification Using ANN
Utterance Based Speaker Identification Using ANNIJCSEA Journal
 
Voice Recognition Based Automation System for Medical Applications and for Ph...
Voice Recognition Based Automation System for Medical Applications and for Ph...Voice Recognition Based Automation System for Medical Applications and for Ph...
Voice Recognition Based Automation System for Medical Applications and for Ph...IRJET Journal
 
Voice Recognition Based Automation System for Medical Applications and for Ph...
Voice Recognition Based Automation System for Medical Applications and for Ph...Voice Recognition Based Automation System for Medical Applications and for Ph...
Voice Recognition Based Automation System for Medical Applications and for Ph...IRJET Journal
 
Voice based autometedtransport enquiry system in #c by Rohit malav
Voice based autometedtransport enquiry system in #c by Rohit malavVoice based autometedtransport enquiry system in #c by Rohit malav
Voice based autometedtransport enquiry system in #c by Rohit malavRohit malav
 
NYAI #5 - Fun With Neural Nets by Jason Yosinski
NYAI #5 - Fun With Neural Nets by Jason YosinskiNYAI #5 - Fun With Neural Nets by Jason Yosinski
NYAI #5 - Fun With Neural Nets by Jason YosinskiRizwan Habib
 
Speaker Recognition System using MFCC and Vector Quantization Approach
Speaker Recognition System using MFCC and Vector Quantization ApproachSpeaker Recognition System using MFCC and Vector Quantization Approach
Speaker Recognition System using MFCC and Vector Quantization Approachijsrd.com
 
Using AI to recognise person
Using AI to recognise personUsing AI to recognise person
Using AI to recognise personSolutionsPortal
 
An overview of speaker recognition by Bhusan Chettri.pdf
An overview of speaker recognition by Bhusan Chettri.pdfAn overview of speaker recognition by Bhusan Chettri.pdf
An overview of speaker recognition by Bhusan Chettri.pdfBhusan Chettri
 
Speaker recognition on matlab
Speaker recognition on matlabSpeaker recognition on matlab
Speaker recognition on matlabArcanjo Salazaku
 
Bachelors project summary
Bachelors project summaryBachelors project summary
Bachelors project summaryAditya Deshmukh
 

Similar to Voice Identification And Recognition System, Matlab (20)

Utterance based speaker identification
Utterance based speaker identificationUtterance based speaker identification
Utterance based speaker identification
 
Speaker Recognition Using Vocal Tract Features
Speaker Recognition Using Vocal Tract FeaturesSpeaker Recognition Using Vocal Tract Features
Speaker Recognition Using Vocal Tract Features
 
50120140502007
5012014050200750120140502007
50120140502007
 
Voice recognition security systems
Voice recognition security systemsVoice recognition security systems
Voice recognition security systems
 
Speaker recognition.
Speaker recognition.Speaker recognition.
Speaker recognition.
 
Utterance Based Speaker Identification Using ANN
Utterance Based Speaker Identification Using ANNUtterance Based Speaker Identification Using ANN
Utterance Based Speaker Identification Using ANN
 
Utterance Based Speaker Identification Using ANN
Utterance Based Speaker Identification Using ANNUtterance Based Speaker Identification Using ANN
Utterance Based Speaker Identification Using ANN
 
Final thesis
Final thesisFinal thesis
Final thesis
 
FINAL report
FINAL reportFINAL report
FINAL report
 
Voice Recognition Based Automation System for Medical Applications and for Ph...
Voice Recognition Based Automation System for Medical Applications and for Ph...Voice Recognition Based Automation System for Medical Applications and for Ph...
Voice Recognition Based Automation System for Medical Applications and for Ph...
 
Voice Recognition Based Automation System for Medical Applications and for Ph...
Voice Recognition Based Automation System for Medical Applications and for Ph...Voice Recognition Based Automation System for Medical Applications and for Ph...
Voice Recognition Based Automation System for Medical Applications and for Ph...
 
52 57
52 5752 57
52 57
 
Voice based autometedtransport enquiry system in #c by Rohit malav
Voice based autometedtransport enquiry system in #c by Rohit malavVoice based autometedtransport enquiry system in #c by Rohit malav
Voice based autometedtransport enquiry system in #c by Rohit malav
 
NYAI #5 - Fun With Neural Nets by Jason Yosinski
NYAI #5 - Fun With Neural Nets by Jason YosinskiNYAI #5 - Fun With Neural Nets by Jason Yosinski
NYAI #5 - Fun With Neural Nets by Jason Yosinski
 
Speaker Recognition System using MFCC and Vector Quantization Approach
Speaker Recognition System using MFCC and Vector Quantization ApproachSpeaker Recognition System using MFCC and Vector Quantization Approach
Speaker Recognition System using MFCC and Vector Quantization Approach
 
Using AI to recognise person
Using AI to recognise personUsing AI to recognise person
Using AI to recognise person
 
An overview of speaker recognition by Bhusan Chettri.pdf
An overview of speaker recognition by Bhusan Chettri.pdfAn overview of speaker recognition by Bhusan Chettri.pdf
An overview of speaker recognition by Bhusan Chettri.pdf
 
Speaker recognition on matlab
Speaker recognition on matlabSpeaker recognition on matlab
Speaker recognition on matlab
 
VOICE RECOGNITION SYSTEM
VOICE RECOGNITION SYSTEMVOICE RECOGNITION SYSTEM
VOICE RECOGNITION SYSTEM
 
Bachelors project summary
Bachelors project summaryBachelors project summary
Bachelors project summary
 

Recently uploaded

MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 

Recently uploaded (20)

★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 

Voice Identification And Recognition System, Matlab

  • 1. VOICE IDENTIFICATION AND RECOGNITION SYSTEM A SIMPLE YET COMPLEX APPROACH TO MODERN SOPHISTICATION VOICE IDENTIFICATION AND RECOGNITION SYSTEM 1
  • 2. GROUP MEMBERS • SOHAIB TALLAT SP13-BCE-040 • FARHAN SHAHID SP13-BCE-013 • ABDUL SAMAD SP13-BCE-002 • MATTI ULLAH ABBASI SP13-BCE-025 VOICE IDENTIFICATION AND RECOGNITION SYSTEM 2
  • 3. INTRODUCTION AND INSPIRATION • As we know that simplicity has taken its tool, it is now the age of sophisticated technologies therefore nowadays efficient security systems have to be utilised in our life. • The “VOICE IDENTIFICATION AND RECOGNITION SYSTEM” has been developed to cater our needs for controlling access to services such as: banking, databases systems etc. which are used to secure confidential information. • We were inspired to make this project for making lock mechanism systems speech automated, especially for the ease of physically disabled people. VOICE IDENTIFICATION AND RECOGNITION SYSTEM 3
  • 4. ABSTRACT • Approaches for making Voice recognition sytems: a. Linear Prediction Coding (LPC) b. Mel-Frequecy Cepstrum Coefficients (MFCC) and others. • Principle Used: Mel-Frequecy Cepstrum Coefficients (MFCC) • Working VOICE IDENTIFICATION AND RECOGNITION SYSTEM 4
  • 5. THE VOICE IDENTIFICATION ALGORITHM • Priciples of Speaker Recognition: a. Identification b. Verification Input speech Feature extraction Reference model (Speaker #1) Similarity Reference model (Speaker #N) Similarity Maximum selection Identification result (Speaker ID) Reference model (Speaker #M) Similarity Input speech Feature extraction Verification result (Accept/Reject) Decision ThresholdSpeaker ID (#M) VOICE IDENTIFICATION AND RECOGNITION SYSTEM 5 Figure 1: Speaker Identification Figure 2: Speaker Recognition
  • 6. FEATURE EXTRACTION • Feature extraction is the process that extracts a small amount of data from the voice signal that can later be used to represent each speaker. • A wide range of possibilities exist for parametrically representing the speech signal for the speaker recognition task, such as Mel Frequency Cepstrum Coefficients (MFCC). 0 0.002 0.004 0.006 0.008 0.01 0.012 0.014 0.016 0.018 -0.5 -0.4 -0.3 -0.2 -0.1 0 0.1 0.2 0.3 0.4 0.5 Time (second) VOICE IDENTIFICATION AND RECOGNITION SYSTEM 6 Figure 3: Example Of Speech Signal
  • 7. MEL-FREQUENCY CEPSTRUM COEFFICIENTS (MFCC) PROCESSOR mel cepstrum mel spectrum framecontinuous speech Frame Blocking Windowing FFT spectrum Mel-frequency Wrapping Cepstrum VOICE IDENTIFICATION AND RECOGNITION SYSTEM 7
  • 8. MFCC PROCESSOR ELABORATED • Frame Blocking • Windowing • Fast Fourier Transform • Mel- Frequency Wrapping • Cepstrum 0 1000 2000 3000 4000 5000 6000 7000 0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2 Mel-spaced filterbank Frequency (Hz) VOICE IDENTIFICATION AND RECOGNITION SYSTEM 8 Figure 4: Example of mel-spaced frequency bank
  • 9. FEATURE MATCHING • Feature matching involves the actual procedure to identify the unknown speaker by comparing extracted features from his/her voice input with the ones from a set of known speakers • The goal of pattern recognition is to classify objects of interest into one of a number of categories or classes. • The objects of interest are called patterns and in our case are sequences of acoustic vectors that are extracted from an input speech. • Classes are referred to individual speakers. VOICE IDENTIFICATION AND RECOGNITION SYSTEM 9
  • 10. PATTERN RECOGNITION TECHNIQUE • Feature matching technique used in “VOICE IDENTIFICATION AND RECOGNITION SYSTEM” is Vector Quantization (VQ). • VQ is a process of mapping vectors from a large vector space to a finite number of regions in that space. Each region is called a cluster and can be represented by its center called a codeword. The collection of all codewords is called a codebook. VOICE IDENTIFICATION AND RECOGNITION SYSTEM 10
  • 11. RECOGNITION PROCESS VOICE IDENTIFICATION AND RECOGNITION SYSTEM 11 Speaker 1 Speaker 1 centroid sample Speaker 2 centroid sample Speaker 2 VQ distortion Figure 5: Conceptual Diagram Illustrating Vector Quantization codebook Formation
  • 12. LINDE-BUZO-GREY ALGORITHM The Linde–Buzo–Gray algorithm (introduced by Yoseph Linde, Andrés Buzo and Robert M. Gray in 1980) is a vector quantization algorithm to derive a good codebook. VOICE IDENTIFICATION AND RECOGNITION SYSTEM 12 Find centroid Split each centroid Cluster vectors Find centroids Compute D (distortion)   D D'D Stop D’ = D m = 2*m No Yes Yes No m < M
  • 13. THE GRAPHICAL USER INTERFACE • There are many ways to make your own custom Graphical User Interface (GUI); you can do it manually or you can use another efficient approach that is the “Guide” approach. VOICE IDENTIFICATION AND RECOGNITION SYSTEM 13 Figure 6: Guide Quick Start Window Figure 7: Our Custom GUI
  • 14. EMBEDDING CODE TO THE GUI • Note that in the figure we have six essential buttons, which perform their unique task. a. “Add New Sound To The Database” b. “Speaker Recognition From Mike” c. “DATABASE INFORMATION” d. “PLOT DATABASE” e. “Delete Database” f. “EXIT” VOICE IDENTIFICATION AND RECOGNITION SYSTEM 14 Figure 7: Our Custom GUI
  • 15. ADDING BACK GROUND TO THE GUI CODE: % create an axes that spans the whole gui ah = axes('unit', 'normalized', 'position', [0 0 1 1]); % import the background image and show it on the axes bg = imread('project image 3.jpg'); imagesc(bg); % prevent plotting over the background and turn the axis off set(ah,'handlevisibility','off','visible','off') % making sure the background is behind all the other uicontrols uistack(ah, 'bottom'); VOICE IDENTIFICATION AND RECOGNITION SYSTEM 15 Figure 8: Our Custom Background
  • 16. VOICE IDENTIFICATION AND RECOGNITION SYSTEM 16 Figure 9: Our Final Program
  • 17. APPLICATION DEPLOYMENT VOICE IDENTIFICATION AND RECOGNITION SYSTEM 17 Figure 10: Standalone application deployment window Figure 11: Our Custom Splash screen
  • 18. REFERENCES • L.R. Rabiner and B.H. Juang, Fundamentals of Speech Recognition, Prentice-Hall, Englewood Cliffs, N.J., 1993. • S.B. Davis and P. Mermelstein, “Comparison of parametric representations for monosyllabic word recognition in continuously spoken sentences”, IEEE Transactions on Acoustics, Speech, Signal Processing, Vol. ASSP-28, No. 4, August 1980 • Y. Linde, A. Buzo & R. Gray, “An algorithm for vector quantizer design”, IEEE Transactions on Communications, Vol. 28, pp.84-95, 1980 • S. Furui, “Speaker independent isolated word recognition using dynamic features of speech spectrum”, IEEE Transactions on Acoustic, Speech, Signal Processing, Vol. ASSP-34, No. 1, pp. 52-59, February 1986 • F.K. Song, A.E. Rosenberg and B.H. Juang, “A vector quantisation approach to speaker recognition”, AT&T Technical Journal, Vol. 66-2, pp. 14-26, March 1987 • comp.speech Frequently Asked Questions WWW site, http://svr-www.eng.cam.ac.uk/comp.speech/ VOICE IDENTIFICATION AND RECOGNITION SYSTEM 18