SlideShare a Scribd company logo
VOICE RECOGNITION SECURITY
SYSTEMS
K.SANDEEP KUMAR
10L01A0431
Point of View
To implement a
Voice-Recognition Security System
to provide Security to your
System
WHAT IS VOICE RECOGNITION
SYSTEM
•The term voice recognition or speaker identification
refers to finding the identity of "who" is speaking,
rather than what they are saying.
•Recognising the Speaker can simplify the task of
translating speech in systems that have been trained
on a specific person's voice or it can be used to
authenticate or verify the identity of a speaker as
part of a security process
•Personal information like Bank Password,bank
amount,Criminal Data can be secured using voice
Recognition
Why Voice Recognition
Security Systems
•Today’s password is going to be the major factor
which is prone to hackers.
•The password is not enough today to secure the
critical Data.
•These Systems can deliver bio-metric Security
technology to the at low-cost than anyone else in the
industry.
•The system can be supportable across a wide range of
platforms including the Embedded Platforms.
OBJECTIVES
•Construct a Voice Recognition using Matlab.
•This Construction can be done in 4 different
steps.
Background Math
Logical Structure
Hardware/Software Tradeoffs
Program Design
1.Background Math
•What we need to know in this projects is how to
calculate the frequency to sample speech based on
the Nyquist Rate Theorem.
•Secondly, we also need to know how to calculate
filter cutoff frequency to build the high and low
pass RC filter for human speech.
•Thirdly, we need to know how to calculate the
gain of differential op-amp.
•Lastly, we need to know how the Fourier
Transform works, because we need to understand
and analyze the outputs of the digital filters.
2.LOGICAL STRUCTURE
The structure is very simple
•The microphone circuit goes to the ADC of the
MCU. The digitized sampling of the word is passed
through the digital filters (flash programmed onto
the MCU).
•The analysis is done on the MCU as well.
•. Once that is done, the LCD which is connected to
the MCU displays if the word spoken matches the
password or not.
.
.
3.Hardware/Software Tradeoffs
•The software tradeoff in this projects is
between the number of filters we can
implement and the maximum number of cycles
we have to adhere to.
•The more filters there are, the more accurate
the speech recognition will be.
•However, because each filter takes about 320
cycles and we could not implement more than
2000 cycles, we had to trade off the accuracy of
the system and limit the number of filters to 7.
4.Program Design
•Because there is not enough memory
(SRAM) on the STK500, we have to deal with
speech analysis during each sample interval.
•The key point of this projects is to how to
design filters and how to implement them.
.
There are two major difficulties we need to
solve:
•First reduce the running time of each filter in
order to get all the finger prints before next
new sample comes. So we have to use fixed-
point algorithm.
•Secondly, set the reasonable cutoff rate for
each filter and number of stages of the filters
I.Speech Spectrum Analysis
•Generally the human speech spectrum is less
than 4000Hz.
•. According to Nyquist theory, the minimum
sampling rate for speech should be
8000samples/second.
•Due to our system is voice-controlled safety
system; it is very helpful to analyze the
speaker's voice before our actual design.
.
After we speak one word, the recorder program will
store the word in a .wav file. Notice this file is
sampled at 16000 samples/second, 16bit/sample, so
we need to convert it into 8000samples/second,
8bits/sample. The whole analysis procedure is as the
following figure
II.FingerPrint Analysis
•The fingerprint of each filter is an
accumulation of 250 consecutive outputs
square of this filter
•.Basically, different words has different
frequency spectrum, then it has different
fingerprint.
•So we need to calculation the difference of
different words and compare to the
difference of same words to test whether
system can recognize it.
III.Filter Design
we know the frequency range of each filter. So
first we use Matlab to generate their coefficients.
Here we use ChebychevII filter.
•Fs=4000; %Hz
•Fnaq=Fs/2; % Nyquist
•[B0, A0]=cheby2 (2, 20, f0); % LPF
•[B6, A6]=cheby2 (2,20, f6, 'high'); % HPF
•[B1, A1]=cheby2 (2, 20, [f0 f1]); % BPF
Hardware Interface
Conclusion
•The project has not met expectations fully.
•But Iam more happy to say that it is able to
recognize a word as the password by more
than 80%-90% of the time, depending on
the choice of passwords.
•In this case, there is a maximum of 5 words
only.
THANK YOU
Any Queries??

More Related Content

What's hot

Automatic Speech Recognition
Automatic Speech RecognitionAutomatic Speech Recognition
Automatic Speech Recognition
International Islamic University
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
Akash Deep Maurya
 
Speech Recognition
Speech RecognitionSpeech Recognition
Speech Recognition
Hugo Moreno
 
Voice recognition system
Voice recognition systemVoice recognition system
Voice recognition system
avinash raibole
 
digital scent technology
digital scent technologydigital scent technology
digital scent technology
SRUTHY K S
 
Biometrics
BiometricsBiometrics
Biometrics
meeravali shaik
 
Voice recognition
Voice recognitionVoice recognition
Voice recognition
Kenneth Carnesi, JD
 
Speech Recognition by Iqbal
Speech Recognition by IqbalSpeech Recognition by Iqbal
Speech Recognition by Iqbal
Iqbal
 
A seminar report on speech recognition technology
A seminar report on speech recognition technologyA seminar report on speech recognition technology
A seminar report on speech recognition technology
SrijanKumar18
 
Silentsound documentation
Silentsound documentationSilentsound documentation
Silentsound documentation
Raj Niranjan
 
Biometrics
BiometricsBiometrics
Biometrics
Priyanka Sharma
 
Abstract Silent Sound Technology
Abstract   Silent Sound TechnologyAbstract   Silent Sound Technology
Abstract Silent Sound Technology
vishnu murthy
 
Voice morphing-
Voice morphing-Voice morphing-
Voice morphing-
Navneet Sharma
 
Speech Recognition
Speech Recognition Speech Recognition
Speech Recognition
Goa App
 
Automatic speech recognition system
Automatic speech recognition systemAutomatic speech recognition system
Automatic speech recognition system
Alok Tiwari
 
Voice Morping ppt
Voice Morping pptVoice Morping ppt
Voice Morping ppt
ciciapaul
 
Digital jewellery ppt
Digital   jewellery pptDigital   jewellery ppt
Digital jewellery ppt
Bharath Kumar G
 
Digitaljewellery presentation
Digitaljewellery presentationDigitaljewellery presentation
Digitaljewellery presentation
aishwarya_320
 
Speech Recognition System By Matlab
Speech Recognition System By MatlabSpeech Recognition System By Matlab
Speech Recognition System By Matlab
Ankit Gujrati
 
palm vein technology
palm vein technologypalm vein technology
palm vein technology
RAJASHREE B
 

What's hot (20)

Automatic Speech Recognition
Automatic Speech RecognitionAutomatic Speech Recognition
Automatic Speech Recognition
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
 
Speech Recognition
Speech RecognitionSpeech Recognition
Speech Recognition
 
Voice recognition system
Voice recognition systemVoice recognition system
Voice recognition system
 
digital scent technology
digital scent technologydigital scent technology
digital scent technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Voice recognition
Voice recognitionVoice recognition
Voice recognition
 
Speech Recognition by Iqbal
Speech Recognition by IqbalSpeech Recognition by Iqbal
Speech Recognition by Iqbal
 
A seminar report on speech recognition technology
A seminar report on speech recognition technologyA seminar report on speech recognition technology
A seminar report on speech recognition technology
 
Silentsound documentation
Silentsound documentationSilentsound documentation
Silentsound documentation
 
Biometrics
BiometricsBiometrics
Biometrics
 
Abstract Silent Sound Technology
Abstract   Silent Sound TechnologyAbstract   Silent Sound Technology
Abstract Silent Sound Technology
 
Voice morphing-
Voice morphing-Voice morphing-
Voice morphing-
 
Speech Recognition
Speech Recognition Speech Recognition
Speech Recognition
 
Automatic speech recognition system
Automatic speech recognition systemAutomatic speech recognition system
Automatic speech recognition system
 
Voice Morping ppt
Voice Morping pptVoice Morping ppt
Voice Morping ppt
 
Digital jewellery ppt
Digital   jewellery pptDigital   jewellery ppt
Digital jewellery ppt
 
Digitaljewellery presentation
Digitaljewellery presentationDigitaljewellery presentation
Digitaljewellery presentation
 
Speech Recognition System By Matlab
Speech Recognition System By MatlabSpeech Recognition System By Matlab
Speech Recognition System By Matlab
 
palm vein technology
palm vein technologypalm vein technology
palm vein technology
 

Viewers also liked

Voice communication security
Voice communication securityVoice communication security
Voice communication security
Fabio Pietrosanti
 
Speech recognition project report
Speech recognition project reportSpeech recognition project report
Speech recognition project report
Sarang Afle
 
Speech recognition
Speech recognitionSpeech recognition
Speech recognition
Charu Joshi
 
VTU Computer Science Engineering & Information Science Engineering Project Ti...
VTU Computer Science Engineering & Information Science Engineering Project Ti...VTU Computer Science Engineering & Information Science Engineering Project Ti...
VTU Computer Science Engineering & Information Science Engineering Project Ti...
zettanetworks
 
Voice based web browser
Voice based web browserVoice based web browser
Voice based web browser
Gowsalyasri
 
Speech to text conversion
Speech to text conversionSpeech to text conversion
Speech to text conversion
ankit_saluja
 
biometric technology
biometric technologybiometric technology
biometric technology
Anmol Bagga
 
Voice based email for blinds
Voice based email for blindsVoice based email for blinds
Voice based email for blinds
Arjun AJ
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
Siddharth Modi
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
Santosh Kumar
 
Why work at Gartner
Why work at GartnerWhy work at Gartner
Why work at Gartner
Glen Johnstone
 
클라우드 인프라 기반 서비스 개발 - ChatON
클라우드 인프라 기반 서비스 개발 - ChatON클라우드 인프라 기반 서비스 개발 - ChatON
클라우드 인프라 기반 서비스 개발 - ChatON
Jay JH Park
 
Top 10 facilities assistant interview questions and answers
Top 10 facilities assistant interview questions and answersTop 10 facilities assistant interview questions and answers
Top 10 facilities assistant interview questions and answers
kenkmin
 
Qualitative Data Analysis (Strategies)
Qualitative Data Analysis (Strategies)Qualitative Data Analysis (Strategies)
Qualitative Data Analysis (Strategies)
guest7f1ad678
 
Glaucoma & target iop
Glaucoma & target iopGlaucoma & target iop
Glaucoma & target iop
doseiha5
 
Unsymmetrical bending and shear centre
Unsymmetrical bending and shear centreUnsymmetrical bending and shear centre
Unsymmetrical bending and shear centre
Yatin Singh
 
The Anatomy of a Landing Page
The Anatomy of a Landing PageThe Anatomy of a Landing Page
The Anatomy of a Landing Page
HubSpot
 
top 10 events assistant interview questions and answers
 top 10 events assistant interview questions and answers top 10 events assistant interview questions and answers
top 10 events assistant interview questions and answers
creatjonh
 
Training staff
Training staffTraining staff
Training staff
Rajendra Nabar
 
What Is The Difference Between Procurement and Purchasing?
What Is The Difference Between Procurement and Purchasing?What Is The Difference Between Procurement and Purchasing?
What Is The Difference Between Procurement and Purchasing?
Procurify.com
 

Viewers also liked (20)

Voice communication security
Voice communication securityVoice communication security
Voice communication security
 
Speech recognition project report
Speech recognition project reportSpeech recognition project report
Speech recognition project report
 
Speech recognition
Speech recognitionSpeech recognition
Speech recognition
 
VTU Computer Science Engineering & Information Science Engineering Project Ti...
VTU Computer Science Engineering & Information Science Engineering Project Ti...VTU Computer Science Engineering & Information Science Engineering Project Ti...
VTU Computer Science Engineering & Information Science Engineering Project Ti...
 
Voice based web browser
Voice based web browserVoice based web browser
Voice based web browser
 
Speech to text conversion
Speech to text conversionSpeech to text conversion
Speech to text conversion
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Voice based email for blinds
Voice based email for blindsVoice based email for blinds
Voice based email for blinds
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
Why work at Gartner
Why work at GartnerWhy work at Gartner
Why work at Gartner
 
클라우드 인프라 기반 서비스 개발 - ChatON
클라우드 인프라 기반 서비스 개발 - ChatON클라우드 인프라 기반 서비스 개발 - ChatON
클라우드 인프라 기반 서비스 개발 - ChatON
 
Top 10 facilities assistant interview questions and answers
Top 10 facilities assistant interview questions and answersTop 10 facilities assistant interview questions and answers
Top 10 facilities assistant interview questions and answers
 
Qualitative Data Analysis (Strategies)
Qualitative Data Analysis (Strategies)Qualitative Data Analysis (Strategies)
Qualitative Data Analysis (Strategies)
 
Glaucoma & target iop
Glaucoma & target iopGlaucoma & target iop
Glaucoma & target iop
 
Unsymmetrical bending and shear centre
Unsymmetrical bending and shear centreUnsymmetrical bending and shear centre
Unsymmetrical bending and shear centre
 
The Anatomy of a Landing Page
The Anatomy of a Landing PageThe Anatomy of a Landing Page
The Anatomy of a Landing Page
 
top 10 events assistant interview questions and answers
 top 10 events assistant interview questions and answers top 10 events assistant interview questions and answers
top 10 events assistant interview questions and answers
 
Training staff
Training staffTraining staff
Training staff
 
What Is The Difference Between Procurement and Purchasing?
What Is The Difference Between Procurement and Purchasing?What Is The Difference Between Procurement and Purchasing?
What Is The Difference Between Procurement and Purchasing?
 

Similar to Voice recognition security systems

Audio Cryptography System
Audio Cryptography SystemAudio Cryptography System
Audio Cryptography System
Raju Raj
 
Voice based autometedtransport enquiry system in #c by Rohit malav
Voice based autometedtransport enquiry system in #c by Rohit malavVoice based autometedtransport enquiry system in #c by Rohit malav
Voice based autometedtransport enquiry system in #c by Rohit malav
Rohit malav
 
Design and Implementation of Speech Based Scientific Calculator
Design and Implementation of Speech Based Scientific CalculatorDesign and Implementation of Speech Based Scientific Calculator
Design and Implementation of Speech Based Scientific Calculator
Shantha Suresh M
 
fingerprint based electronic voting machine
fingerprint based electronic voting machinefingerprint based electronic voting machine
fingerprint based electronic voting machine
santhu652
 
Information and network security 28 blowfish
Information and network security 28 blowfishInformation and network security 28 blowfish
Information and network security 28 blowfish
Vaibhav Khanna
 
IRJET- Voice Command Execution with Speech Recognition and Synthesizer
IRJET- Voice Command Execution with Speech Recognition and SynthesizerIRJET- Voice Command Execution with Speech Recognition and Synthesizer
IRJET- Voice Command Execution with Speech Recognition and Synthesizer
IRJET Journal
 
Internet security evaluation system documentation nikitha
Internet security evaluation system documentation nikithaInternet security evaluation system documentation nikitha
Internet security evaluation system documentation nikitha
Susmitha Reddy
 
Utterance based speaker identification
Utterance based speaker identificationUtterance based speaker identification
Utterance based speaker identification
IJCSEA Journal
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
Waqas Ahmed Nawaz
 
ITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdf
ThangDang53
 
QCon 2015 - Microservices Track Notes
QCon 2015 - Microservices Track Notes QCon 2015 - Microservices Track Notes
QCon 2015 - Microservices Track Notes
Abdul Basit Munda
 
Encryption symmetric key
Encryption symmetric keyEncryption symmetric key
Encryption symmetric key
mdhar123
 
Acoustic Time Series in Industry 4.0: Improved Reliability and Cyber-Security...
Acoustic Time Series in Industry 4.0: Improved Reliability and Cyber-Security...Acoustic Time Series in Industry 4.0: Improved Reliability and Cyber-Security...
Acoustic Time Series in Industry 4.0: Improved Reliability and Cyber-Security...
J On The Beach
 
Web Application Security Testing
Web Application Security TestingWeb Application Security Testing
Web Application Security Testing
Agile Testing Alliance
 
Training report on embedded sys_AVR
Training report on embedded sys_AVRTraining report on embedded sys_AVR
Training report on embedded sys_AVR
Galgotias College of Engg. & Tech.
 
The Big Data Is A Significant Subject Of Modern Times With...
The Big Data Is A Significant Subject Of Modern Times With...The Big Data Is A Significant Subject Of Modern Times With...
The Big Data Is A Significant Subject Of Modern Times With...
Sarah Gordon
 
VoIP Security 101 what you need to know
VoIP Security 101   what you need to knowVoIP Security 101   what you need to know
VoIP Security 101 what you need to know
Eric Klein
 
Utterance Based Speaker Identification Using ANN
Utterance Based Speaker Identification Using ANNUtterance Based Speaker Identification Using ANN
Utterance Based Speaker Identification Using ANN
IJCSEA Journal
 
Utterance Based Speaker Identification Using ANN
Utterance Based Speaker Identification Using ANNUtterance Based Speaker Identification Using ANN
Utterance Based Speaker Identification Using ANN
IJCSEA Journal
 
2018 FRecure CISSP Mentor Program- Session 4
2018 FRecure CISSP Mentor Program- Session 42018 FRecure CISSP Mentor Program- Session 4
2018 FRecure CISSP Mentor Program- Session 4
FRSecure
 

Similar to Voice recognition security systems (20)

Audio Cryptography System
Audio Cryptography SystemAudio Cryptography System
Audio Cryptography System
 
Voice based autometedtransport enquiry system in #c by Rohit malav
Voice based autometedtransport enquiry system in #c by Rohit malavVoice based autometedtransport enquiry system in #c by Rohit malav
Voice based autometedtransport enquiry system in #c by Rohit malav
 
Design and Implementation of Speech Based Scientific Calculator
Design and Implementation of Speech Based Scientific CalculatorDesign and Implementation of Speech Based Scientific Calculator
Design and Implementation of Speech Based Scientific Calculator
 
fingerprint based electronic voting machine
fingerprint based electronic voting machinefingerprint based electronic voting machine
fingerprint based electronic voting machine
 
Information and network security 28 blowfish
Information and network security 28 blowfishInformation and network security 28 blowfish
Information and network security 28 blowfish
 
IRJET- Voice Command Execution with Speech Recognition and Synthesizer
IRJET- Voice Command Execution with Speech Recognition and SynthesizerIRJET- Voice Command Execution with Speech Recognition and Synthesizer
IRJET- Voice Command Execution with Speech Recognition and Synthesizer
 
Internet security evaluation system documentation nikitha
Internet security evaluation system documentation nikithaInternet security evaluation system documentation nikitha
Internet security evaluation system documentation nikitha
 
Utterance based speaker identification
Utterance based speaker identificationUtterance based speaker identification
Utterance based speaker identification
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
 
ITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdf
 
QCon 2015 - Microservices Track Notes
QCon 2015 - Microservices Track Notes QCon 2015 - Microservices Track Notes
QCon 2015 - Microservices Track Notes
 
Encryption symmetric key
Encryption symmetric keyEncryption symmetric key
Encryption symmetric key
 
Acoustic Time Series in Industry 4.0: Improved Reliability and Cyber-Security...
Acoustic Time Series in Industry 4.0: Improved Reliability and Cyber-Security...Acoustic Time Series in Industry 4.0: Improved Reliability and Cyber-Security...
Acoustic Time Series in Industry 4.0: Improved Reliability and Cyber-Security...
 
Web Application Security Testing
Web Application Security TestingWeb Application Security Testing
Web Application Security Testing
 
Training report on embedded sys_AVR
Training report on embedded sys_AVRTraining report on embedded sys_AVR
Training report on embedded sys_AVR
 
The Big Data Is A Significant Subject Of Modern Times With...
The Big Data Is A Significant Subject Of Modern Times With...The Big Data Is A Significant Subject Of Modern Times With...
The Big Data Is A Significant Subject Of Modern Times With...
 
VoIP Security 101 what you need to know
VoIP Security 101   what you need to knowVoIP Security 101   what you need to know
VoIP Security 101 what you need to know
 
Utterance Based Speaker Identification Using ANN
Utterance Based Speaker Identification Using ANNUtterance Based Speaker Identification Using ANN
Utterance Based Speaker Identification Using ANN
 
Utterance Based Speaker Identification Using ANN
Utterance Based Speaker Identification Using ANNUtterance Based Speaker Identification Using ANN
Utterance Based Speaker Identification Using ANN
 
2018 FRecure CISSP Mentor Program- Session 4
2018 FRecure CISSP Mentor Program- Session 42018 FRecure CISSP Mentor Program- Session 4
2018 FRecure CISSP Mentor Program- Session 4
 

Recently uploaded

World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 

Recently uploaded (20)

World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 

Voice recognition security systems

  • 2. Point of View To implement a Voice-Recognition Security System to provide Security to your System
  • 3. WHAT IS VOICE RECOGNITION SYSTEM •The term voice recognition or speaker identification refers to finding the identity of "who" is speaking, rather than what they are saying. •Recognising the Speaker can simplify the task of translating speech in systems that have been trained on a specific person's voice or it can be used to authenticate or verify the identity of a speaker as part of a security process •Personal information like Bank Password,bank amount,Criminal Data can be secured using voice Recognition
  • 4. Why Voice Recognition Security Systems •Today’s password is going to be the major factor which is prone to hackers. •The password is not enough today to secure the critical Data. •These Systems can deliver bio-metric Security technology to the at low-cost than anyone else in the industry. •The system can be supportable across a wide range of platforms including the Embedded Platforms.
  • 5. OBJECTIVES •Construct a Voice Recognition using Matlab. •This Construction can be done in 4 different steps. Background Math Logical Structure Hardware/Software Tradeoffs Program Design
  • 6. 1.Background Math •What we need to know in this projects is how to calculate the frequency to sample speech based on the Nyquist Rate Theorem. •Secondly, we also need to know how to calculate filter cutoff frequency to build the high and low pass RC filter for human speech. •Thirdly, we need to know how to calculate the gain of differential op-amp. •Lastly, we need to know how the Fourier Transform works, because we need to understand and analyze the outputs of the digital filters.
  • 7. 2.LOGICAL STRUCTURE The structure is very simple •The microphone circuit goes to the ADC of the MCU. The digitized sampling of the word is passed through the digital filters (flash programmed onto the MCU). •The analysis is done on the MCU as well. •. Once that is done, the LCD which is connected to the MCU displays if the word spoken matches the password or not.
  • 8. . .
  • 9. 3.Hardware/Software Tradeoffs •The software tradeoff in this projects is between the number of filters we can implement and the maximum number of cycles we have to adhere to. •The more filters there are, the more accurate the speech recognition will be. •However, because each filter takes about 320 cycles and we could not implement more than 2000 cycles, we had to trade off the accuracy of the system and limit the number of filters to 7.
  • 10. 4.Program Design •Because there is not enough memory (SRAM) on the STK500, we have to deal with speech analysis during each sample interval. •The key point of this projects is to how to design filters and how to implement them.
  • 11. . There are two major difficulties we need to solve: •First reduce the running time of each filter in order to get all the finger prints before next new sample comes. So we have to use fixed- point algorithm. •Secondly, set the reasonable cutoff rate for each filter and number of stages of the filters
  • 12. I.Speech Spectrum Analysis •Generally the human speech spectrum is less than 4000Hz. •. According to Nyquist theory, the minimum sampling rate for speech should be 8000samples/second. •Due to our system is voice-controlled safety system; it is very helpful to analyze the speaker's voice before our actual design.
  • 13. . After we speak one word, the recorder program will store the word in a .wav file. Notice this file is sampled at 16000 samples/second, 16bit/sample, so we need to convert it into 8000samples/second, 8bits/sample. The whole analysis procedure is as the following figure
  • 14. II.FingerPrint Analysis •The fingerprint of each filter is an accumulation of 250 consecutive outputs square of this filter •.Basically, different words has different frequency spectrum, then it has different fingerprint. •So we need to calculation the difference of different words and compare to the difference of same words to test whether system can recognize it.
  • 15. III.Filter Design we know the frequency range of each filter. So first we use Matlab to generate their coefficients. Here we use ChebychevII filter. •Fs=4000; %Hz •Fnaq=Fs/2; % Nyquist •[B0, A0]=cheby2 (2, 20, f0); % LPF •[B6, A6]=cheby2 (2,20, f6, 'high'); % HPF •[B1, A1]=cheby2 (2, 20, [f0 f1]); % BPF
  • 17. Conclusion •The project has not met expectations fully. •But Iam more happy to say that it is able to recognize a word as the password by more than 80%-90% of the time, depending on the choice of passwords. •In this case, there is a maximum of 5 words only.