SlideShare a Scribd company logo
1 of 3
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 538
Voice-based Login System
Vedant Baviskar1, Shubham Bhagwat2, Deepjyoti Barman3, Gokul Viswanath4,
Mrs. R.T. Waghmode 5
1,2,3,4,5 B.Tech student, Computer Science, Sinhgad Institute of Technology and Science, Pune, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - This project on Voice Authentication analyses
audio to determine the identity of a user and authenticate
them into a system while using Gaussian Mixture Models. This
has a wide set of uses, from a normal web application to a
high-security facility.
Understanding how complex and high dimensional audio can
be recognized is one a challenge. Audio data contains
information that can be used effectivelyforinformationorcan
be filtered out (in the case of our project) using Audio Content
Analysis. This information includes background noise, crowd
chatter and other noise like animals or cars. These reasons
make audio recognition and classification a very challenging
research topic. High dimensional audio can be exceedingly
large in size and can pose problems to the speed of
authentication and the performance impact on the devices
used. So to solve this problem, we use audio formats such as
MPEG to maintain the high level of detail in the audio clip,
while also keeping the file size small.
Key Words: High dimensional audio, Audio Content
Analysis, Moving Pictures Expert Group, Gaussian
Mixture Model
1. INTRODUCTION
Voice Biometrics is a technology that relies on the
recognition of voice patterns to verify the identity of
individuals. This is possible as each person’s vocal tract is
unique. Physical features, both phonetic and morphological
are unique to each individual making them virtually fraud
proof. It enables fast, frictionless and a very secure way to
authenticate users.
This process of authentication works in two steps, the first
being the classification of the audio into speech and non-
speech audio, the latter being music, noise and environment
sounds.
The second part starts by creating a list of characteristics
that the trained model perceives from the voice, which is
stored in an array. Then the user's characteristics that were
saved during registering will be downloaded and used to
compare both arrays. If thedistancebetween boththearrays
is below a specific threshold value, then the user is
authenticated.
1.1 RELEVANCE
There are many areas that can use Biometric identification
(in this case, Voice Authentication). The main areas this can
be used are the ones where security is prioritized, ranging
from a company login for admin tools to a high-security
military checkpoint to watch border crossings at different
frontiers.
Higher ranked military forces canusethistoregulateentryto
particular top-level facilities.
Although the military is one main sector, even normal social
media logins can be done using voice authentication, if they
wish to.
When a person is driving a vehicle, they can use systems that
use Voice Authentication and recognition to use services
while also keeping theireyesontheroad,thuscontributingto
road safety.
People with dyslexia would experience difficulties reading
items on a screen and thus can use Voice Authentication to
log in and use a service without much difficulty.
1.2 MOTIVATION
As stated before, analysing and understanding
multidimensional audio data is a big challenge. Using data
from that analysis and implementing it in a real-timesystem
is even more so.
Such analyses and implementations can provide useful
information to us about audio, and how they can beusedina
wide range to applications that we use every day as part of
our lifestyle. The voice is something you are, and uniquely
defines you and your characteristics. This can help people
and organizations introduce more such platforms that use
Voice Authentication, and thus make the users' life easier
while maintaining (or even strengthening) the level of
security.
2. REQUIREMENTS
Following are the requirements for the Voice Authentication
system.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 539
1. Server side
o Language – Python
o Libraries – FastAPI, Fastdtw, OCI, Scipy,
Ffmpeg-python, Numpy, Python-jose
2. Client-Side
o Language - HTML, CSS, JavaScript
o Libraries – React, Next, Axios, Recorder.js
3. Methodology
In order to authenticate the voice, we first get the users
voice sample.
We take a base sample from the user, the first voice they
upload, and we pass it through our feature extraction
pipeline. After that we take at-least 4 more samples of the
users voice and pass them through the same pipeline. This
pipeline, at the end, returns a value that is between 0 and 1.
This value indicates that the distance (or angle) between
the two voices is most if the value is 0 and least if the value is
1. In other words, the larger the value, the closer two voice
samples are.
Once we take the users samples, we do a mean of all the
values and determine an optimum value out of it. This value
is what we use in order to compare the login voice sample.
When a user tries to login, they pass a voice sample. This
voice sample is also passed through the same pipeline and it
is compared to the optimum value that we store. Depending
on the result of the above comparison we either let the user
login or not.
The pipeline that we have built, does a few things. First
step is to reduce the noise from the audio. We do this by
utilizing a Python library that determines noise based on the
frequency.
Once we pass the audio through this, we pass it through
another algorithm that returns a spectrogram of the audio.
After this, we pass the second audio sample through the
same above steps and we end up with a spectrogram as well.
Once we have two spectrograms, we find the cosine
similarity of the two spectrograms invariousplots.Thevalue
of cosine similarity is between 0 and 1. Once we have the
cosine similarity of various locations in the spectrogram, we
find the mean of those values and get a single value.
This value is the overall cosine similarity which is also
between 0 and 1. This value indicates how close the two
audio samples are.
As explained above, depending on the above value, we either
let the user log-in or show an error.
Fig -1: Project Architecture
3. CONCLUSIONS
During this project and the experiments we conducted
during this project, we uncovered a few limitations. They
are:
 Recognizing a user's voice if it changes due to sickness,
accent changes or speech patterns is a challenge.
 Authentication speed and processing impactonthehost
device, while being low, is still high compared to other
techniques.
 Because voice technology is easier to spoofascompared
to other forms of biometric authentication, liveness
detection tests needs to be used to verify if the user
trying to log in is actually the user and not someone else
trying to spoof the system.
These limitations can definitely be solved in the future with
advances in technology and the increase in the speed and
power of processors, but currently hold back Voice
Authentication in being a widespread authentication
technology.
As the years go by, the number of users of digital platforms
for government services as well as the private sector
services is increasing rapidly. Such a secure and foolproof
authentication technique is a needed to ensurethatthelogin
process is smooth and easy while also maintaining the same
high level of security.
As Voice authentication can uniquely identify an individual
by their different traits i.e. identifying you by "who you are"
and not by "what you have", it is becoming a widely used
technique. Its low chance of failure and easy usage makes it
an attractive option in systems around the world.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 540
ACKNOWLEDGEMENT
We would like to thank our Head of Department Mrs. G. S.
Navale, for giving us all the help and important suggestions
all over the Seminar Work along with our internal guideMrs.
R.T. Waghmode, for giving us guidance and support
throughout the Seminar. Lastly, special thanks to our
Principal Dr. S. D. Markande for providing ambience in the
college, which motivate us to work.
REFERENCES
[1] Deep Learning for Audio Signal Processing - Hendrik
Purwins∗, Bo Li∗, Tuomas Virtanen∗, Jan Schlüter∗,
Shuo-yiin Chang, Tara Sainath, M. Young, The Technical
Writer’s Handbook. Mill Valley, CA: University Science,
1989.
[2] Unsupervised feature learning for audio classification
using convolutional deep belief networks -Honglak Lee,
Yan Largman, Peter Pham, Andrew Y. Ng
[3] An Introduction to Audio Content Analysis Applications
in Signal Processing and Music Informatics – Alexander
Lerch
[4] librosa: Audio and Music Signal Analysis in Python -
Brian McFee, Colin Raffel,DawenLiang,Daniel P.W.Ellis,
Matt McVicar, Eric Battenberg, Oriol Nieto
[5] Biometric Audio Security – Lloyd Trammell, Lawrence
Schwartz
[6] Audio Data Analysis Using Deep Learning with Python
(Part 1) - Nagesh Singh Chauhan
BIOGRAPHIES
Mrs. R.T. Waghmode is currently working as a Professor
in Sinhgad Institute of Technology and Science, Narhe.
Vedant Baviskar is a final-year B.E. student in Savitribai
Phule Pune University.
Gokul Viswanath is a final-year B.E. student in Savitribai
Phule Pune University.
Deepjyoti Barman is a final-year B.E. student in
Savitribai Phule Pune University.
Shubham Bhagwat is a final-year B.E. student in
Savitribai Phule Pune University.

More Related Content

Similar to Voice login system analyzed with audio models

IRJET- Hearing Loss Detection through Audiogram in Mobile Devices
IRJET-  	  Hearing Loss Detection through Audiogram in Mobile DevicesIRJET-  	  Hearing Loss Detection through Audiogram in Mobile Devices
IRJET- Hearing Loss Detection through Audiogram in Mobile DevicesIRJET Journal
 
Interactive Voice Response System for College automation
Interactive Voice Response System for College automationInteractive Voice Response System for College automation
Interactive Voice Response System for College automationIRJET Journal
 
Conversational Voice Controlled News Application
Conversational Voice Controlled News ApplicationConversational Voice Controlled News Application
Conversational Voice Controlled News ApplicationIRJET Journal
 
Autotuned voice cloning enabling multilingualism
Autotuned voice cloning enabling multilingualismAutotuned voice cloning enabling multilingualism
Autotuned voice cloning enabling multilingualismIRJET Journal
 
SPEECH RECOGNITION WITH LANGUAGE SPECIFICATION
SPEECH RECOGNITION WITH LANGUAGE SPECIFICATIONSPEECH RECOGNITION WITH LANGUAGE SPECIFICATION
SPEECH RECOGNITION WITH LANGUAGE SPECIFICATIONIRJET Journal
 
IRJET- Voice Modulation and Verification for Smart Authentication System
IRJET- Voice Modulation and Verification for Smart Authentication SystemIRJET- Voice Modulation and Verification for Smart Authentication System
IRJET- Voice Modulation and Verification for Smart Authentication SystemIRJET Journal
 
IRJET - Dual Verification ATM for Blind People
IRJET -  	  Dual Verification ATM for Blind PeopleIRJET -  	  Dual Verification ATM for Blind People
IRJET - Dual Verification ATM for Blind PeopleIRJET Journal
 
Voice Assistant Using Python and AI
Voice Assistant Using Python and AIVoice Assistant Using Python and AI
Voice Assistant Using Python and AIIRJET Journal
 
IRJET - Threat Prediction using Speech Analysis
IRJET - Threat Prediction using Speech AnalysisIRJET - Threat Prediction using Speech Analysis
IRJET - Threat Prediction using Speech AnalysisIRJET Journal
 
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICES
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICESVOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICES
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICESijsptm
 
Authentication system with Decentralized chat app
Authentication system with Decentralized chat appAuthentication system with Decentralized chat app
Authentication system with Decentralized chat appIRJET Journal
 
IRJET- Verbal Authentication for Personal Digital Assistants
IRJET- Verbal Authentication for Personal Digital AssistantsIRJET- Verbal Authentication for Personal Digital Assistants
IRJET- Verbal Authentication for Personal Digital AssistantsIRJET Journal
 
Biometric Ear Recognition System
Biometric Ear Recognition SystemBiometric Ear Recognition System
Biometric Ear Recognition SystemIRJET Journal
 
Fingerprint Based Attendance System by IOT
Fingerprint Based Attendance System by IOTFingerprint Based Attendance System by IOT
Fingerprint Based Attendance System by IOTIRJET Journal
 
IRJET - Hand Gestures Recognition using Deep Learning
IRJET -  	  Hand Gestures Recognition using Deep LearningIRJET -  	  Hand Gestures Recognition using Deep Learning
IRJET - Hand Gestures Recognition using Deep LearningIRJET Journal
 
Voice Based Email System For Visual Impaired Using AI
Voice Based Email System For Visual Impaired Using AIVoice Based Email System For Visual Impaired Using AI
Voice Based Email System For Visual Impaired Using AIIRJET Journal
 
IRJET - Voice based E-Mail for Visually Impaired
IRJET - Voice based E-Mail for Visually ImpairedIRJET - Voice based E-Mail for Visually Impaired
IRJET - Voice based E-Mail for Visually ImpairedIRJET Journal
 
IRJET- Data Transmission for Proximity Devices using Ultrasonic Sound Waves
IRJET- Data Transmission for Proximity Devices using Ultrasonic Sound WavesIRJET- Data Transmission for Proximity Devices using Ultrasonic Sound Waves
IRJET- Data Transmission for Proximity Devices using Ultrasonic Sound WavesIRJET Journal
 
VOICE-BASED EMAIL SYSTEM FOR VISUALLY IMPAIRED PEOPLE
VOICE-BASED EMAIL SYSTEM FOR VISUALLY IMPAIRED PEOPLEVOICE-BASED EMAIL SYSTEM FOR VISUALLY IMPAIRED PEOPLE
VOICE-BASED EMAIL SYSTEM FOR VISUALLY IMPAIRED PEOPLEIRJET Journal
 
VOICE-BASED EMAIL SYSTEM FOR VISUALLY IMPAIRED PEOPLE
VOICE-BASED EMAIL SYSTEM FOR VISUALLY IMPAIRED PEOPLEVOICE-BASED EMAIL SYSTEM FOR VISUALLY IMPAIRED PEOPLE
VOICE-BASED EMAIL SYSTEM FOR VISUALLY IMPAIRED PEOPLEIRJET Journal
 

Similar to Voice login system analyzed with audio models (20)

IRJET- Hearing Loss Detection through Audiogram in Mobile Devices
IRJET-  	  Hearing Loss Detection through Audiogram in Mobile DevicesIRJET-  	  Hearing Loss Detection through Audiogram in Mobile Devices
IRJET- Hearing Loss Detection through Audiogram in Mobile Devices
 
Interactive Voice Response System for College automation
Interactive Voice Response System for College automationInteractive Voice Response System for College automation
Interactive Voice Response System for College automation
 
Conversational Voice Controlled News Application
Conversational Voice Controlled News ApplicationConversational Voice Controlled News Application
Conversational Voice Controlled News Application
 
Autotuned voice cloning enabling multilingualism
Autotuned voice cloning enabling multilingualismAutotuned voice cloning enabling multilingualism
Autotuned voice cloning enabling multilingualism
 
SPEECH RECOGNITION WITH LANGUAGE SPECIFICATION
SPEECH RECOGNITION WITH LANGUAGE SPECIFICATIONSPEECH RECOGNITION WITH LANGUAGE SPECIFICATION
SPEECH RECOGNITION WITH LANGUAGE SPECIFICATION
 
IRJET- Voice Modulation and Verification for Smart Authentication System
IRJET- Voice Modulation and Verification for Smart Authentication SystemIRJET- Voice Modulation and Verification for Smart Authentication System
IRJET- Voice Modulation and Verification for Smart Authentication System
 
IRJET - Dual Verification ATM for Blind People
IRJET -  	  Dual Verification ATM for Blind PeopleIRJET -  	  Dual Verification ATM for Blind People
IRJET - Dual Verification ATM for Blind People
 
Voice Assistant Using Python and AI
Voice Assistant Using Python and AIVoice Assistant Using Python and AI
Voice Assistant Using Python and AI
 
IRJET - Threat Prediction using Speech Analysis
IRJET - Threat Prediction using Speech AnalysisIRJET - Threat Prediction using Speech Analysis
IRJET - Threat Prediction using Speech Analysis
 
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICES
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICESVOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICES
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICES
 
Authentication system with Decentralized chat app
Authentication system with Decentralized chat appAuthentication system with Decentralized chat app
Authentication system with Decentralized chat app
 
IRJET- Verbal Authentication for Personal Digital Assistants
IRJET- Verbal Authentication for Personal Digital AssistantsIRJET- Verbal Authentication for Personal Digital Assistants
IRJET- Verbal Authentication for Personal Digital Assistants
 
Biometric Ear Recognition System
Biometric Ear Recognition SystemBiometric Ear Recognition System
Biometric Ear Recognition System
 
Fingerprint Based Attendance System by IOT
Fingerprint Based Attendance System by IOTFingerprint Based Attendance System by IOT
Fingerprint Based Attendance System by IOT
 
IRJET - Hand Gestures Recognition using Deep Learning
IRJET -  	  Hand Gestures Recognition using Deep LearningIRJET -  	  Hand Gestures Recognition using Deep Learning
IRJET - Hand Gestures Recognition using Deep Learning
 
Voice Based Email System For Visual Impaired Using AI
Voice Based Email System For Visual Impaired Using AIVoice Based Email System For Visual Impaired Using AI
Voice Based Email System For Visual Impaired Using AI
 
IRJET - Voice based E-Mail for Visually Impaired
IRJET - Voice based E-Mail for Visually ImpairedIRJET - Voice based E-Mail for Visually Impaired
IRJET - Voice based E-Mail for Visually Impaired
 
IRJET- Data Transmission for Proximity Devices using Ultrasonic Sound Waves
IRJET- Data Transmission for Proximity Devices using Ultrasonic Sound WavesIRJET- Data Transmission for Proximity Devices using Ultrasonic Sound Waves
IRJET- Data Transmission for Proximity Devices using Ultrasonic Sound Waves
 
VOICE-BASED EMAIL SYSTEM FOR VISUALLY IMPAIRED PEOPLE
VOICE-BASED EMAIL SYSTEM FOR VISUALLY IMPAIRED PEOPLEVOICE-BASED EMAIL SYSTEM FOR VISUALLY IMPAIRED PEOPLE
VOICE-BASED EMAIL SYSTEM FOR VISUALLY IMPAIRED PEOPLE
 
VOICE-BASED EMAIL SYSTEM FOR VISUALLY IMPAIRED PEOPLE
VOICE-BASED EMAIL SYSTEM FOR VISUALLY IMPAIRED PEOPLEVOICE-BASED EMAIL SYSTEM FOR VISUALLY IMPAIRED PEOPLE
VOICE-BASED EMAIL SYSTEM FOR VISUALLY IMPAIRED PEOPLE
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 

Recently uploaded (20)

Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 

Voice login system analyzed with audio models

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 538 Voice-based Login System Vedant Baviskar1, Shubham Bhagwat2, Deepjyoti Barman3, Gokul Viswanath4, Mrs. R.T. Waghmode 5 1,2,3,4,5 B.Tech student, Computer Science, Sinhgad Institute of Technology and Science, Pune, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - This project on Voice Authentication analyses audio to determine the identity of a user and authenticate them into a system while using Gaussian Mixture Models. This has a wide set of uses, from a normal web application to a high-security facility. Understanding how complex and high dimensional audio can be recognized is one a challenge. Audio data contains information that can be used effectivelyforinformationorcan be filtered out (in the case of our project) using Audio Content Analysis. This information includes background noise, crowd chatter and other noise like animals or cars. These reasons make audio recognition and classification a very challenging research topic. High dimensional audio can be exceedingly large in size and can pose problems to the speed of authentication and the performance impact on the devices used. So to solve this problem, we use audio formats such as MPEG to maintain the high level of detail in the audio clip, while also keeping the file size small. Key Words: High dimensional audio, Audio Content Analysis, Moving Pictures Expert Group, Gaussian Mixture Model 1. INTRODUCTION Voice Biometrics is a technology that relies on the recognition of voice patterns to verify the identity of individuals. This is possible as each person’s vocal tract is unique. Physical features, both phonetic and morphological are unique to each individual making them virtually fraud proof. It enables fast, frictionless and a very secure way to authenticate users. This process of authentication works in two steps, the first being the classification of the audio into speech and non- speech audio, the latter being music, noise and environment sounds. The second part starts by creating a list of characteristics that the trained model perceives from the voice, which is stored in an array. Then the user's characteristics that were saved during registering will be downloaded and used to compare both arrays. If thedistancebetween boththearrays is below a specific threshold value, then the user is authenticated. 1.1 RELEVANCE There are many areas that can use Biometric identification (in this case, Voice Authentication). The main areas this can be used are the ones where security is prioritized, ranging from a company login for admin tools to a high-security military checkpoint to watch border crossings at different frontiers. Higher ranked military forces canusethistoregulateentryto particular top-level facilities. Although the military is one main sector, even normal social media logins can be done using voice authentication, if they wish to. When a person is driving a vehicle, they can use systems that use Voice Authentication and recognition to use services while also keeping theireyesontheroad,thuscontributingto road safety. People with dyslexia would experience difficulties reading items on a screen and thus can use Voice Authentication to log in and use a service without much difficulty. 1.2 MOTIVATION As stated before, analysing and understanding multidimensional audio data is a big challenge. Using data from that analysis and implementing it in a real-timesystem is even more so. Such analyses and implementations can provide useful information to us about audio, and how they can beusedina wide range to applications that we use every day as part of our lifestyle. The voice is something you are, and uniquely defines you and your characteristics. This can help people and organizations introduce more such platforms that use Voice Authentication, and thus make the users' life easier while maintaining (or even strengthening) the level of security. 2. REQUIREMENTS Following are the requirements for the Voice Authentication system.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 539 1. Server side o Language – Python o Libraries – FastAPI, Fastdtw, OCI, Scipy, Ffmpeg-python, Numpy, Python-jose 2. Client-Side o Language - HTML, CSS, JavaScript o Libraries – React, Next, Axios, Recorder.js 3. Methodology In order to authenticate the voice, we first get the users voice sample. We take a base sample from the user, the first voice they upload, and we pass it through our feature extraction pipeline. After that we take at-least 4 more samples of the users voice and pass them through the same pipeline. This pipeline, at the end, returns a value that is between 0 and 1. This value indicates that the distance (or angle) between the two voices is most if the value is 0 and least if the value is 1. In other words, the larger the value, the closer two voice samples are. Once we take the users samples, we do a mean of all the values and determine an optimum value out of it. This value is what we use in order to compare the login voice sample. When a user tries to login, they pass a voice sample. This voice sample is also passed through the same pipeline and it is compared to the optimum value that we store. Depending on the result of the above comparison we either let the user login or not. The pipeline that we have built, does a few things. First step is to reduce the noise from the audio. We do this by utilizing a Python library that determines noise based on the frequency. Once we pass the audio through this, we pass it through another algorithm that returns a spectrogram of the audio. After this, we pass the second audio sample through the same above steps and we end up with a spectrogram as well. Once we have two spectrograms, we find the cosine similarity of the two spectrograms invariousplots.Thevalue of cosine similarity is between 0 and 1. Once we have the cosine similarity of various locations in the spectrogram, we find the mean of those values and get a single value. This value is the overall cosine similarity which is also between 0 and 1. This value indicates how close the two audio samples are. As explained above, depending on the above value, we either let the user log-in or show an error. Fig -1: Project Architecture 3. CONCLUSIONS During this project and the experiments we conducted during this project, we uncovered a few limitations. They are:  Recognizing a user's voice if it changes due to sickness, accent changes or speech patterns is a challenge.  Authentication speed and processing impactonthehost device, while being low, is still high compared to other techniques.  Because voice technology is easier to spoofascompared to other forms of biometric authentication, liveness detection tests needs to be used to verify if the user trying to log in is actually the user and not someone else trying to spoof the system. These limitations can definitely be solved in the future with advances in technology and the increase in the speed and power of processors, but currently hold back Voice Authentication in being a widespread authentication technology. As the years go by, the number of users of digital platforms for government services as well as the private sector services is increasing rapidly. Such a secure and foolproof authentication technique is a needed to ensurethatthelogin process is smooth and easy while also maintaining the same high level of security. As Voice authentication can uniquely identify an individual by their different traits i.e. identifying you by "who you are" and not by "what you have", it is becoming a widely used technique. Its low chance of failure and easy usage makes it an attractive option in systems around the world.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 540 ACKNOWLEDGEMENT We would like to thank our Head of Department Mrs. G. S. Navale, for giving us all the help and important suggestions all over the Seminar Work along with our internal guideMrs. R.T. Waghmode, for giving us guidance and support throughout the Seminar. Lastly, special thanks to our Principal Dr. S. D. Markande for providing ambience in the college, which motivate us to work. REFERENCES [1] Deep Learning for Audio Signal Processing - Hendrik Purwins∗, Bo Li∗, Tuomas Virtanen∗, Jan Schlüter∗, Shuo-yiin Chang, Tara Sainath, M. Young, The Technical Writer’s Handbook. Mill Valley, CA: University Science, 1989. [2] Unsupervised feature learning for audio classification using convolutional deep belief networks -Honglak Lee, Yan Largman, Peter Pham, Andrew Y. Ng [3] An Introduction to Audio Content Analysis Applications in Signal Processing and Music Informatics – Alexander Lerch [4] librosa: Audio and Music Signal Analysis in Python - Brian McFee, Colin Raffel,DawenLiang,Daniel P.W.Ellis, Matt McVicar, Eric Battenberg, Oriol Nieto [5] Biometric Audio Security – Lloyd Trammell, Lawrence Schwartz [6] Audio Data Analysis Using Deep Learning with Python (Part 1) - Nagesh Singh Chauhan BIOGRAPHIES Mrs. R.T. Waghmode is currently working as a Professor in Sinhgad Institute of Technology and Science, Narhe. Vedant Baviskar is a final-year B.E. student in Savitribai Phule Pune University. Gokul Viswanath is a final-year B.E. student in Savitribai Phule Pune University. Deepjyoti Barman is a final-year B.E. student in Savitribai Phule Pune University. Shubham Bhagwat is a final-year B.E. student in Savitribai Phule Pune University.