SlideShare a Scribd company logo
1 of 10
PROJECT ON Affiliated to  UNDER THE GUIDENCE OF  B.M. NAVEEN KUMAR BY NIKHIL R AND GIRISH CSE ‘A’
Point of view To implement a  Voice Based Security System to provide  security to your  system. The system is based on  Voice-to-phoneme algorithm and  phonetic transcription.
What is Voice Based Security System (VBSS)? ,[object Object],[object Object],[object Object],[object Object]
Why voice based security system (VBSS)? ,[object Object],[object Object],[object Object],[object Object]
Drawbacks of the existing system ,[object Object],[object Object],[object Object]
Scope of the proposed system ,[object Object],[object Object],[object Object],[object Object],[object Object]
Proposed software architecture Record Voice Tag Phonetic Decoder Speech Recognizer Comparator Sequential Hypothesis Combination User Profiles database Access granted/denied store Retrieve Profiles ACCESS GRANTED
MODULES Voice Tracking Module This entire module is implemented in a thread where it continuously listens to the voice by switching on and off the microphone. This module will be provided with the user interface to record a voice. Voice Analysis and Storage Module This modules uses the phonetic decoding using phoneme approach. This module will analyze the voice and extracts words or sentences from the voice tags. This module is responsible for converting the listened data into English words by the process called phonetic decoding.  Authentication Module Admin Module This module is responsible for the comparison of present voice tag with the existing voice tags in the systems. It will take the support of the voice tracking module and the voice analysis module to compare the voices and read the microphone.  This module is used by the administrator of the security system. It is responsible for registration of users, deleting the existing user. By passing the security for the specific users … etc., This module will take help from the voice tracking module for registration of new users.
References ,[object Object],[object Object],[object Object]
Thank you

More Related Content

Similar to VOICE BASED SECURITY SYSTEM

Java project titles
Java project titlesJava project titles
Java project titles
Ashly Liza
 
Speaker recognition in android
Speaker recognition in androidSpeaker recognition in android
Speaker recognition in android
Anshuli Mittal
 
Speaker recognition in android
Speaker recognition in androidSpeaker recognition in android
Speaker recognition in android
Anshuli Mittal
 

Similar to VOICE BASED SECURITY SYSTEM (20)

An overview of speaker recognition by Bhusan Chettri.pdf
An overview of speaker recognition by Bhusan Chettri.pdfAn overview of speaker recognition by Bhusan Chettri.pdf
An overview of speaker recognition by Bhusan Chettri.pdf
 
Using AI to recognise person
Using AI to recognise personUsing AI to recognise person
Using AI to recognise person
 
Story Voice authentication systems .pdf
Story Voice authentication systems .pdfStory Voice authentication systems .pdf
Story Voice authentication systems .pdf
 
Java project titles
Java project titlesJava project titles
Java project titles
 
Review On Speech Recognition using Deep Learning
Review On Speech Recognition using Deep LearningReview On Speech Recognition using Deep Learning
Review On Speech Recognition using Deep Learning
 
Speaker recognition in android
Speaker recognition in androidSpeaker recognition in android
Speaker recognition in android
 
Automatic Speaker Recognition and AI.pdf
Automatic Speaker Recognition and AI.pdfAutomatic Speaker Recognition and AI.pdf
Automatic Speaker Recognition and AI.pdf
 
Voice based autometedtransport enquiry system in #c by Rohit malav
Voice based autometedtransport enquiry system in #c by Rohit malavVoice based autometedtransport enquiry system in #c by Rohit malav
Voice based autometedtransport enquiry system in #c by Rohit malav
 
30
3030
30
 
How to implement voice biometrics.pdf
How to implement voice biometrics.pdfHow to implement voice biometrics.pdf
How to implement voice biometrics.pdf
 
Speech Recognition in Artificail Inteligence
Speech Recognition in Artificail InteligenceSpeech Recognition in Artificail Inteligence
Speech Recognition in Artificail Inteligence
 
Speaker recognition in android
Speaker recognition in androidSpeaker recognition in android
Speaker recognition in android
 
IRJET- Voice based Billing System
IRJET-  	  Voice based Billing SystemIRJET-  	  Voice based Billing System
IRJET- Voice based Billing System
 
Authentication System Based on the Combination of Voice Biometrics and OTP Ge...
Authentication System Based on the Combination of Voice Biometrics and OTP Ge...Authentication System Based on the Combination of Voice Biometrics and OTP Ge...
Authentication System Based on the Combination of Voice Biometrics and OTP Ge...
 
IRJET- Vocal Code
IRJET- Vocal CodeIRJET- Vocal Code
IRJET- Vocal Code
 
IRJET- Voice Command Execution with Speech Recognition and Synthesizer
IRJET- Voice Command Execution with Speech Recognition and SynthesizerIRJET- Voice Command Execution with Speech Recognition and Synthesizer
IRJET- Voice Command Execution with Speech Recognition and Synthesizer
 
Voice recognition
Voice recognitionVoice recognition
Voice recognition
 
50120140502007
5012014050200750120140502007
50120140502007
 
IJSRED-V2I2P5
IJSRED-V2I2P5IJSRED-V2I2P5
IJSRED-V2I2P5
 
Assistive Examination System for Visually Impaired
Assistive Examination System for Visually ImpairedAssistive Examination System for Visually Impaired
Assistive Examination System for Visually Impaired
 

VOICE BASED SECURITY SYSTEM

  • 1. PROJECT ON Affiliated to UNDER THE GUIDENCE OF B.M. NAVEEN KUMAR BY NIKHIL R AND GIRISH CSE ‘A’
  • 2. Point of view To implement a Voice Based Security System to provide security to your system. The system is based on Voice-to-phoneme algorithm and phonetic transcription.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. Proposed software architecture Record Voice Tag Phonetic Decoder Speech Recognizer Comparator Sequential Hypothesis Combination User Profiles database Access granted/denied store Retrieve Profiles ACCESS GRANTED
  • 8. MODULES Voice Tracking Module This entire module is implemented in a thread where it continuously listens to the voice by switching on and off the microphone. This module will be provided with the user interface to record a voice. Voice Analysis and Storage Module This modules uses the phonetic decoding using phoneme approach. This module will analyze the voice and extracts words or sentences from the voice tags. This module is responsible for converting the listened data into English words by the process called phonetic decoding. Authentication Module Admin Module This module is responsible for the comparison of present voice tag with the existing voice tags in the systems. It will take the support of the voice tracking module and the voice analysis module to compare the voices and read the microphone. This module is used by the administrator of the security system. It is responsible for registration of users, deleting the existing user. By passing the security for the specific users … etc., This module will take help from the voice tracking module for registration of new users.
  • 9.

Editor's Notes

  1. www.forrester.com © 2003, Forrester Research, Inc.
  2. www.forrester.com © 2003, Forrester Research, Inc.
  3. www.forrester.com © 2003, Forrester Research, Inc.
  4. www.forrester.com © 2003, Forrester Research, Inc.
  5. www.forrester.com © 2003, Forrester Research, Inc.