Submit Search
Upload
Voice login system analyzed with audio models
•
0 likes
•
4 views
AI-enhanced title
IRJET Journal
Follow
https://www.irjet.net/archives/V9/i5/IRJET-V9I5179.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 3
Download now
Download to read offline
Recommended
IRJET- Fingerprint based Folder Lock
IRJET- Fingerprint based Folder Lock
IRJET Journal
Review On Speech Recognition using Deep Learning
Review On Speech Recognition using Deep Learning
IRJET Journal
Voice Recognition System for Automobile Safety.
Voice Recognition System for Automobile Safety.
IRJET Journal
Authentication System Based on the Combination of Voice Biometrics and OTP Ge...
Authentication System Based on the Combination of Voice Biometrics and OTP Ge...
ijtsrd
Signature Verification System using CNN & SNN
Signature Verification System using CNN & SNN
IRJET Journal
IJSRED-V2I5P43
IJSRED-V2I5P43
IJSRED
SURVEY ON SMART VIRTUAL VOICE ASSISTANT
SURVEY ON SMART VIRTUAL VOICE ASSISTANT
IRJET Journal
IRJET- Email Framework for Blinds using Speech Recognition
IRJET- Email Framework for Blinds using Speech Recognition
IRJET Journal
Recommended
IRJET- Fingerprint based Folder Lock
IRJET- Fingerprint based Folder Lock
IRJET Journal
Review On Speech Recognition using Deep Learning
Review On Speech Recognition using Deep Learning
IRJET Journal
Voice Recognition System for Automobile Safety.
Voice Recognition System for Automobile Safety.
IRJET Journal
Authentication System Based on the Combination of Voice Biometrics and OTP Ge...
Authentication System Based on the Combination of Voice Biometrics and OTP Ge...
ijtsrd
Signature Verification System using CNN & SNN
Signature Verification System using CNN & SNN
IRJET Journal
IJSRED-V2I5P43
IJSRED-V2I5P43
IJSRED
SURVEY ON SMART VIRTUAL VOICE ASSISTANT
SURVEY ON SMART VIRTUAL VOICE ASSISTANT
IRJET Journal
IRJET- Email Framework for Blinds using Speech Recognition
IRJET- Email Framework for Blinds using Speech Recognition
IRJET Journal
IRJET- Hearing Loss Detection through Audiogram in Mobile Devices
IRJET- Hearing Loss Detection through Audiogram in Mobile Devices
IRJET Journal
Interactive Voice Response System for College automation
Interactive Voice Response System for College automation
IRJET Journal
Conversational Voice Controlled News Application
Conversational Voice Controlled News Application
IRJET Journal
Autotuned voice cloning enabling multilingualism
Autotuned voice cloning enabling multilingualism
IRJET Journal
SPEECH RECOGNITION WITH LANGUAGE SPECIFICATION
SPEECH RECOGNITION WITH LANGUAGE SPECIFICATION
IRJET Journal
IRJET- Voice Modulation and Verification for Smart Authentication System
IRJET- Voice Modulation and Verification for Smart Authentication System
IRJET Journal
IRJET - Dual Verification ATM for Blind People
IRJET - Dual Verification ATM for Blind People
IRJET Journal
Voice Assistant Using Python and AI
Voice Assistant Using Python and AI
IRJET Journal
IRJET - Threat Prediction using Speech Analysis
IRJET - Threat Prediction using Speech Analysis
IRJET Journal
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICES
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICES
ijsptm
Authentication system with Decentralized chat app
Authentication system with Decentralized chat app
IRJET Journal
IRJET- Verbal Authentication for Personal Digital Assistants
IRJET- Verbal Authentication for Personal Digital Assistants
IRJET Journal
Biometric Ear Recognition System
Biometric Ear Recognition System
IRJET Journal
Fingerprint Based Attendance System by IOT
Fingerprint Based Attendance System by IOT
IRJET Journal
IRJET - Hand Gestures Recognition using Deep Learning
IRJET - Hand Gestures Recognition using Deep Learning
IRJET Journal
Voice Based Email System For Visual Impaired Using AI
Voice Based Email System For Visual Impaired Using AI
IRJET Journal
IRJET - Voice based E-Mail for Visually Impaired
IRJET - Voice based E-Mail for Visually Impaired
IRJET Journal
IRJET- Data Transmission for Proximity Devices using Ultrasonic Sound Waves
IRJET- Data Transmission for Proximity Devices using Ultrasonic Sound Waves
IRJET Journal
VOICE-BASED EMAIL SYSTEM FOR VISUALLY IMPAIRED PEOPLE
VOICE-BASED EMAIL SYSTEM FOR VISUALLY IMPAIRED PEOPLE
IRJET Journal
VOICE-BASED EMAIL SYSTEM FOR VISUALLY IMPAIRED PEOPLE
VOICE-BASED EMAIL SYSTEM FOR VISUALLY IMPAIRED PEOPLE
IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
More Related Content
Similar to Voice login system analyzed with audio models
IRJET- Hearing Loss Detection through Audiogram in Mobile Devices
IRJET- Hearing Loss Detection through Audiogram in Mobile Devices
IRJET Journal
Interactive Voice Response System for College automation
Interactive Voice Response System for College automation
IRJET Journal
Conversational Voice Controlled News Application
Conversational Voice Controlled News Application
IRJET Journal
Autotuned voice cloning enabling multilingualism
Autotuned voice cloning enabling multilingualism
IRJET Journal
SPEECH RECOGNITION WITH LANGUAGE SPECIFICATION
SPEECH RECOGNITION WITH LANGUAGE SPECIFICATION
IRJET Journal
IRJET- Voice Modulation and Verification for Smart Authentication System
IRJET- Voice Modulation and Verification for Smart Authentication System
IRJET Journal
IRJET - Dual Verification ATM for Blind People
IRJET - Dual Verification ATM for Blind People
IRJET Journal
Voice Assistant Using Python and AI
Voice Assistant Using Python and AI
IRJET Journal
IRJET - Threat Prediction using Speech Analysis
IRJET - Threat Prediction using Speech Analysis
IRJET Journal
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICES
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICES
ijsptm
Authentication system with Decentralized chat app
Authentication system with Decentralized chat app
IRJET Journal
IRJET- Verbal Authentication for Personal Digital Assistants
IRJET- Verbal Authentication for Personal Digital Assistants
IRJET Journal
Biometric Ear Recognition System
Biometric Ear Recognition System
IRJET Journal
Fingerprint Based Attendance System by IOT
Fingerprint Based Attendance System by IOT
IRJET Journal
IRJET - Hand Gestures Recognition using Deep Learning
IRJET - Hand Gestures Recognition using Deep Learning
IRJET Journal
Voice Based Email System For Visual Impaired Using AI
Voice Based Email System For Visual Impaired Using AI
IRJET Journal
IRJET - Voice based E-Mail for Visually Impaired
IRJET - Voice based E-Mail for Visually Impaired
IRJET Journal
IRJET- Data Transmission for Proximity Devices using Ultrasonic Sound Waves
IRJET- Data Transmission for Proximity Devices using Ultrasonic Sound Waves
IRJET Journal
VOICE-BASED EMAIL SYSTEM FOR VISUALLY IMPAIRED PEOPLE
VOICE-BASED EMAIL SYSTEM FOR VISUALLY IMPAIRED PEOPLE
IRJET Journal
VOICE-BASED EMAIL SYSTEM FOR VISUALLY IMPAIRED PEOPLE
VOICE-BASED EMAIL SYSTEM FOR VISUALLY IMPAIRED PEOPLE
IRJET Journal
Similar to Voice login system analyzed with audio models
(20)
IRJET- Hearing Loss Detection through Audiogram in Mobile Devices
IRJET- Hearing Loss Detection through Audiogram in Mobile Devices
Interactive Voice Response System for College automation
Interactive Voice Response System for College automation
Conversational Voice Controlled News Application
Conversational Voice Controlled News Application
Autotuned voice cloning enabling multilingualism
Autotuned voice cloning enabling multilingualism
SPEECH RECOGNITION WITH LANGUAGE SPECIFICATION
SPEECH RECOGNITION WITH LANGUAGE SPECIFICATION
IRJET- Voice Modulation and Verification for Smart Authentication System
IRJET- Voice Modulation and Verification for Smart Authentication System
IRJET - Dual Verification ATM for Blind People
IRJET - Dual Verification ATM for Blind People
Voice Assistant Using Python and AI
Voice Assistant Using Python and AI
IRJET - Threat Prediction using Speech Analysis
IRJET - Threat Prediction using Speech Analysis
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICES
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICES
Authentication system with Decentralized chat app
Authentication system with Decentralized chat app
IRJET- Verbal Authentication for Personal Digital Assistants
IRJET- Verbal Authentication for Personal Digital Assistants
Biometric Ear Recognition System
Biometric Ear Recognition System
Fingerprint Based Attendance System by IOT
Fingerprint Based Attendance System by IOT
IRJET - Hand Gestures Recognition using Deep Learning
IRJET - Hand Gestures Recognition using Deep Learning
Voice Based Email System For Visual Impaired Using AI
Voice Based Email System For Visual Impaired Using AI
IRJET - Voice based E-Mail for Visually Impaired
IRJET - Voice based E-Mail for Visually Impaired
IRJET- Data Transmission for Proximity Devices using Ultrasonic Sound Waves
IRJET- Data Transmission for Proximity Devices using Ultrasonic Sound Waves
VOICE-BASED EMAIL SYSTEM FOR VISUALLY IMPAIRED PEOPLE
VOICE-BASED EMAIL SYSTEM FOR VISUALLY IMPAIRED PEOPLE
VOICE-BASED EMAIL SYSTEM FOR VISUALLY IMPAIRED PEOPLE
VOICE-BASED EMAIL SYSTEM FOR VISUALLY IMPAIRED PEOPLE
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
AbhinavSharma374939
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Suhani Kapoor
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
RajaP95
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
humanexperienceaaa
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
slot gacor bisa pakai pulsa
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
srsj9000
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
hassan khalil
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
purnimasatapathy1234
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
ranjana rawat
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
rakeshbaidya232001
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
ranjana rawat
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Tsuyoshi Horigome
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
M Maged Hegazy, LLM, MBA, CCP, P3O
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
ranjana rawat
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
Recently uploaded
(20)
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
Voice login system analyzed with audio models
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 538 Voice-based Login System Vedant Baviskar1, Shubham Bhagwat2, Deepjyoti Barman3, Gokul Viswanath4, Mrs. R.T. Waghmode 5 1,2,3,4,5 B.Tech student, Computer Science, Sinhgad Institute of Technology and Science, Pune, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - This project on Voice Authentication analyses audio to determine the identity of a user and authenticate them into a system while using Gaussian Mixture Models. This has a wide set of uses, from a normal web application to a high-security facility. Understanding how complex and high dimensional audio can be recognized is one a challenge. Audio data contains information that can be used effectivelyforinformationorcan be filtered out (in the case of our project) using Audio Content Analysis. This information includes background noise, crowd chatter and other noise like animals or cars. These reasons make audio recognition and classification a very challenging research topic. High dimensional audio can be exceedingly large in size and can pose problems to the speed of authentication and the performance impact on the devices used. So to solve this problem, we use audio formats such as MPEG to maintain the high level of detail in the audio clip, while also keeping the file size small. Key Words: High dimensional audio, Audio Content Analysis, Moving Pictures Expert Group, Gaussian Mixture Model 1. INTRODUCTION Voice Biometrics is a technology that relies on the recognition of voice patterns to verify the identity of individuals. This is possible as each person’s vocal tract is unique. Physical features, both phonetic and morphological are unique to each individual making them virtually fraud proof. It enables fast, frictionless and a very secure way to authenticate users. This process of authentication works in two steps, the first being the classification of the audio into speech and non- speech audio, the latter being music, noise and environment sounds. The second part starts by creating a list of characteristics that the trained model perceives from the voice, which is stored in an array. Then the user's characteristics that were saved during registering will be downloaded and used to compare both arrays. If thedistancebetween boththearrays is below a specific threshold value, then the user is authenticated. 1.1 RELEVANCE There are many areas that can use Biometric identification (in this case, Voice Authentication). The main areas this can be used are the ones where security is prioritized, ranging from a company login for admin tools to a high-security military checkpoint to watch border crossings at different frontiers. Higher ranked military forces canusethistoregulateentryto particular top-level facilities. Although the military is one main sector, even normal social media logins can be done using voice authentication, if they wish to. When a person is driving a vehicle, they can use systems that use Voice Authentication and recognition to use services while also keeping theireyesontheroad,thuscontributingto road safety. People with dyslexia would experience difficulties reading items on a screen and thus can use Voice Authentication to log in and use a service without much difficulty. 1.2 MOTIVATION As stated before, analysing and understanding multidimensional audio data is a big challenge. Using data from that analysis and implementing it in a real-timesystem is even more so. Such analyses and implementations can provide useful information to us about audio, and how they can beusedina wide range to applications that we use every day as part of our lifestyle. The voice is something you are, and uniquely defines you and your characteristics. This can help people and organizations introduce more such platforms that use Voice Authentication, and thus make the users' life easier while maintaining (or even strengthening) the level of security. 2. REQUIREMENTS Following are the requirements for the Voice Authentication system.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 539 1. Server side o Language – Python o Libraries – FastAPI, Fastdtw, OCI, Scipy, Ffmpeg-python, Numpy, Python-jose 2. Client-Side o Language - HTML, CSS, JavaScript o Libraries – React, Next, Axios, Recorder.js 3. Methodology In order to authenticate the voice, we first get the users voice sample. We take a base sample from the user, the first voice they upload, and we pass it through our feature extraction pipeline. After that we take at-least 4 more samples of the users voice and pass them through the same pipeline. This pipeline, at the end, returns a value that is between 0 and 1. This value indicates that the distance (or angle) between the two voices is most if the value is 0 and least if the value is 1. In other words, the larger the value, the closer two voice samples are. Once we take the users samples, we do a mean of all the values and determine an optimum value out of it. This value is what we use in order to compare the login voice sample. When a user tries to login, they pass a voice sample. This voice sample is also passed through the same pipeline and it is compared to the optimum value that we store. Depending on the result of the above comparison we either let the user login or not. The pipeline that we have built, does a few things. First step is to reduce the noise from the audio. We do this by utilizing a Python library that determines noise based on the frequency. Once we pass the audio through this, we pass it through another algorithm that returns a spectrogram of the audio. After this, we pass the second audio sample through the same above steps and we end up with a spectrogram as well. Once we have two spectrograms, we find the cosine similarity of the two spectrograms invariousplots.Thevalue of cosine similarity is between 0 and 1. Once we have the cosine similarity of various locations in the spectrogram, we find the mean of those values and get a single value. This value is the overall cosine similarity which is also between 0 and 1. This value indicates how close the two audio samples are. As explained above, depending on the above value, we either let the user log-in or show an error. Fig -1: Project Architecture 3. CONCLUSIONS During this project and the experiments we conducted during this project, we uncovered a few limitations. They are: Recognizing a user's voice if it changes due to sickness, accent changes or speech patterns is a challenge. Authentication speed and processing impactonthehost device, while being low, is still high compared to other techniques. Because voice technology is easier to spoofascompared to other forms of biometric authentication, liveness detection tests needs to be used to verify if the user trying to log in is actually the user and not someone else trying to spoof the system. These limitations can definitely be solved in the future with advances in technology and the increase in the speed and power of processors, but currently hold back Voice Authentication in being a widespread authentication technology. As the years go by, the number of users of digital platforms for government services as well as the private sector services is increasing rapidly. Such a secure and foolproof authentication technique is a needed to ensurethatthelogin process is smooth and easy while also maintaining the same high level of security. As Voice authentication can uniquely identify an individual by their different traits i.e. identifying you by "who you are" and not by "what you have", it is becoming a widely used technique. Its low chance of failure and easy usage makes it an attractive option in systems around the world.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 540 ACKNOWLEDGEMENT We would like to thank our Head of Department Mrs. G. S. Navale, for giving us all the help and important suggestions all over the Seminar Work along with our internal guideMrs. R.T. Waghmode, for giving us guidance and support throughout the Seminar. Lastly, special thanks to our Principal Dr. S. D. Markande for providing ambience in the college, which motivate us to work. REFERENCES [1] Deep Learning for Audio Signal Processing - Hendrik Purwins∗, Bo Li∗, Tuomas Virtanen∗, Jan Schlüter∗, Shuo-yiin Chang, Tara Sainath, M. Young, The Technical Writer’s Handbook. Mill Valley, CA: University Science, 1989. [2] Unsupervised feature learning for audio classification using convolutional deep belief networks -Honglak Lee, Yan Largman, Peter Pham, Andrew Y. Ng [3] An Introduction to Audio Content Analysis Applications in Signal Processing and Music Informatics – Alexander Lerch [4] librosa: Audio and Music Signal Analysis in Python - Brian McFee, Colin Raffel,DawenLiang,Daniel P.W.Ellis, Matt McVicar, Eric Battenberg, Oriol Nieto [5] Biometric Audio Security – Lloyd Trammell, Lawrence Schwartz [6] Audio Data Analysis Using Deep Learning with Python (Part 1) - Nagesh Singh Chauhan BIOGRAPHIES Mrs. R.T. Waghmode is currently working as a Professor in Sinhgad Institute of Technology and Science, Narhe. Vedant Baviskar is a final-year B.E. student in Savitribai Phule Pune University. Gokul Viswanath is a final-year B.E. student in Savitribai Phule Pune University. Deepjyoti Barman is a final-year B.E. student in Savitribai Phule Pune University. Shubham Bhagwat is a final-year B.E. student in Savitribai Phule Pune University.
Download now