Today password is going to be the major security factor which is prone to hackers.
The password is not sufficient enough today to secure critical data.
Voice Based Security System can deliver biometric security technology to the market at a lower cost than anyone else in the industry, with no reoccurring maintenance costs such as database management or complicated user training.
The system can be supportable across a wide range of platforms including the embedded platforms.
HMMs are directly used as the abstract speech representations in voice-tag applications. This approach has enjoyed considerable success as it is a language independent and achieves high speech recognition accuracy while maintaining the low CPU requirement for the HMM-based voice-tag.
As long as the targeted number of voice-tags is restricted to two or there dozen in an application, the memory consumption of this strategy is not so good.
Another attribute of the HMM-based voice-tag is its speaker-dependence.
The proposed system is a speaker-independent voice-tag application.
A voice-to-phoneme algorithm which maximizes user convenience during voice-tag enrollment while improving recognition accuracy.
Admin must be able to create, modify and delete a user from entering the system.
For user convenience, the number of example utterances per voice-tag during enrollment is minimal.
VBSS is designed to overcome the difficulties of CPU and Memory space.
Proposed software architecture Record Voice Tag Phonetic Decoder Speech Recognizer Comparator Sequential Hypothesis Combination User Profiles database Access granted/denied store Retrieve Profiles ACCESS GRANTED
MODULES Voice Tracking Module This entire module is implemented in a thread where it continuously listens to the voice by switching on and off the microphone. This module will be provided with the user interface to record a voice. Voice Analysis and Storage Module This modules uses the phonetic decoding using phoneme approach. This module will analyze the voice and extracts words or sentences from the voice tags. This module is responsible for converting the listened data into English words by the process called phonetic decoding. Authentication Module Admin Module This module is responsible for the comparison of present voice tag with the existing voice tags in the systems. It will take the support of the voice tracking module and the voice analysis module to compare the voices and read the microphone. This module is used by the administrator of the security system. It is responsible for registration of users, deleting the existing user. By passing the security for the specific users … etc., This module will take help from the voice tracking module for registration of new users.