SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 538
Voice-based Login System
Vedant Baviskar1, Shubham Bhagwat2, Deepjyoti Barman3, Gokul Viswanath4,
Mrs. R.T. Waghmode 5
1,2,3,4,5 B.Tech student, Computer Science, Sinhgad Institute of Technology and Science, Pune, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - This project on Voice Authentication analyses
audio to determine the identity of a user and authenticate
them into a system while using Gaussian Mixture Models. This
has a wide set of uses, from a normal web application to a
high-security facility.
Understanding how complex and high dimensional audio can
be recognized is one a challenge. Audio data contains
information that can be used effectivelyforinformationorcan
be filtered out (in the case of our project) using Audio Content
Analysis. This information includes background noise, crowd
chatter and other noise like animals or cars. These reasons
make audio recognition and classification a very challenging
research topic. High dimensional audio can be exceedingly
large in size and can pose problems to the speed of
authentication and the performance impact on the devices
used. So to solve this problem, we use audio formats such as
MPEG to maintain the high level of detail in the audio clip,
while also keeping the file size small.
Key Words: High dimensional audio, Audio Content
Analysis, Moving Pictures Expert Group, Gaussian
Mixture Model
1. INTRODUCTION
Voice Biometrics is a technology that relies on the
recognition of voice patterns to verify the identity of
individuals. This is possible as each person’s vocal tract is
unique. Physical features, both phonetic and morphological
are unique to each individual making them virtually fraud
proof. It enables fast, frictionless and a very secure way to
authenticate users.
This process of authentication works in two steps, the first
being the classification of the audio into speech and non-
speech audio, the latter being music, noise and environment
sounds.
The second part starts by creating a list of characteristics
that the trained model perceives from the voice, which is
stored in an array. Then the user's characteristics that were
saved during registering will be downloaded and used to
compare both arrays. If thedistancebetween boththearrays
is below a specific threshold value, then the user is
authenticated.
1.1 RELEVANCE
There are many areas that can use Biometric identification
(in this case, Voice Authentication). The main areas this can
be used are the ones where security is prioritized, ranging
from a company login for admin tools to a high-security
military checkpoint to watch border crossings at different
frontiers.
Higher ranked military forces canusethistoregulateentryto
particular top-level facilities.
Although the military is one main sector, even normal social
media logins can be done using voice authentication, if they
wish to.
When a person is driving a vehicle, they can use systems that
use Voice Authentication and recognition to use services
while also keeping theireyesontheroad,thuscontributingto
road safety.
People with dyslexia would experience difficulties reading
items on a screen and thus can use Voice Authentication to
log in and use a service without much difficulty.
1.2 MOTIVATION
As stated before, analysing and understanding
multidimensional audio data is a big challenge. Using data
from that analysis and implementing it in a real-timesystem
is even more so.
Such analyses and implementations can provide useful
information to us about audio, and how they can beusedina
wide range to applications that we use every day as part of
our lifestyle. The voice is something you are, and uniquely
defines you and your characteristics. This can help people
and organizations introduce more such platforms that use
Voice Authentication, and thus make the users' life easier
while maintaining (or even strengthening) the level of
security.
2. REQUIREMENTS
Following are the requirements for the Voice Authentication
system.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 539
1. Server side
o Language – Python
o Libraries – FastAPI, Fastdtw, OCI, Scipy,
Ffmpeg-python, Numpy, Python-jose
2. Client-Side
o Language - HTML, CSS, JavaScript
o Libraries – React, Next, Axios, Recorder.js
3. Methodology
In order to authenticate the voice, we first get the users
voice sample.
We take a base sample from the user, the first voice they
upload, and we pass it through our feature extraction
pipeline. After that we take at-least 4 more samples of the
users voice and pass them through the same pipeline. This
pipeline, at the end, returns a value that is between 0 and 1.
This value indicates that the distance (or angle) between
the two voices is most if the value is 0 and least if the value is
1. In other words, the larger the value, the closer two voice
samples are.
Once we take the users samples, we do a mean of all the
values and determine an optimum value out of it. This value
is what we use in order to compare the login voice sample.
When a user tries to login, they pass a voice sample. This
voice sample is also passed through the same pipeline and it
is compared to the optimum value that we store. Depending
on the result of the above comparison we either let the user
login or not.
The pipeline that we have built, does a few things. First
step is to reduce the noise from the audio. We do this by
utilizing a Python library that determines noise based on the
frequency.
Once we pass the audio through this, we pass it through
another algorithm that returns a spectrogram of the audio.
After this, we pass the second audio sample through the
same above steps and we end up with a spectrogram as well.
Once we have two spectrograms, we find the cosine
similarity of the two spectrograms invariousplots.Thevalue
of cosine similarity is between 0 and 1. Once we have the
cosine similarity of various locations in the spectrogram, we
find the mean of those values and get a single value.
This value is the overall cosine similarity which is also
between 0 and 1. This value indicates how close the two
audio samples are.
As explained above, depending on the above value, we either
let the user log-in or show an error.
Fig -1: Project Architecture
3. CONCLUSIONS
During this project and the experiments we conducted
during this project, we uncovered a few limitations. They
are:
 Recognizing a user's voice if it changes due to sickness,
accent changes or speech patterns is a challenge.
 Authentication speed and processing impactonthehost
device, while being low, is still high compared to other
techniques.
 Because voice technology is easier to spoofascompared
to other forms of biometric authentication, liveness
detection tests needs to be used to verify if the user
trying to log in is actually the user and not someone else
trying to spoof the system.
These limitations can definitely be solved in the future with
advances in technology and the increase in the speed and
power of processors, but currently hold back Voice
Authentication in being a widespread authentication
technology.
As the years go by, the number of users of digital platforms
for government services as well as the private sector
services is increasing rapidly. Such a secure and foolproof
authentication technique is a needed to ensurethatthelogin
process is smooth and easy while also maintaining the same
high level of security.
As Voice authentication can uniquely identify an individual
by their different traits i.e. identifying you by "who you are"
and not by "what you have", it is becoming a widely used
technique. Its low chance of failure and easy usage makes it
an attractive option in systems around the world.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 540
ACKNOWLEDGEMENT
We would like to thank our Head of Department Mrs. G. S.
Navale, for giving us all the help and important suggestions
all over the Seminar Work along with our internal guideMrs.
R.T. Waghmode, for giving us guidance and support
throughout the Seminar. Lastly, special thanks to our
Principal Dr. S. D. Markande for providing ambience in the
college, which motivate us to work.
REFERENCES
[1] Deep Learning for Audio Signal Processing - Hendrik
Purwins∗, Bo Li∗, Tuomas Virtanen∗, Jan Schlüter∗,
Shuo-yiin Chang, Tara Sainath, M. Young, The Technical
Writer’s Handbook. Mill Valley, CA: University Science,
1989.
[2] Unsupervised feature learning for audio classification
using convolutional deep belief networks -Honglak Lee,
Yan Largman, Peter Pham, Andrew Y. Ng
[3] An Introduction to Audio Content Analysis Applications
in Signal Processing and Music Informatics – Alexander
Lerch
[4] librosa: Audio and Music Signal Analysis in Python -
Brian McFee, Colin Raffel,DawenLiang,Daniel P.W.Ellis,
Matt McVicar, Eric Battenberg, Oriol Nieto
[5] Biometric Audio Security – Lloyd Trammell, Lawrence
Schwartz
[6] Audio Data Analysis Using Deep Learning with Python
(Part 1) - Nagesh Singh Chauhan
BIOGRAPHIES
Mrs. R.T. Waghmode is currently working as a Professor
in Sinhgad Institute of Technology and Science, Narhe.
Vedant Baviskar is a final-year B.E. student in Savitribai
Phule Pune University.
Gokul Viswanath is a final-year B.E. student in Savitribai
Phule Pune University.
Deepjyoti Barman is a final-year B.E. student in
Savitribai Phule Pune University.
Shubham Bhagwat is a final-year B.E. student in
Savitribai Phule Pune University.

More Related Content

Similar to Voice-based Login System

IRJET- Hearing Loss Detection through Audiogram in Mobile Devices
IRJET-  	  Hearing Loss Detection through Audiogram in Mobile DevicesIRJET-  	  Hearing Loss Detection through Audiogram in Mobile Devices
IRJET- Hearing Loss Detection through Audiogram in Mobile Devices
IRJET Journal
 
Interactive Voice Response System for College automation
Interactive Voice Response System for College automationInteractive Voice Response System for College automation
Interactive Voice Response System for College automation
IRJET Journal
 
Conversational Voice Controlled News Application
Conversational Voice Controlled News ApplicationConversational Voice Controlled News Application
Conversational Voice Controlled News Application
IRJET Journal
 
Autotuned voice cloning enabling multilingualism
Autotuned voice cloning enabling multilingualismAutotuned voice cloning enabling multilingualism
Autotuned voice cloning enabling multilingualism
IRJET Journal
 
SPEECH RECOGNITION WITH LANGUAGE SPECIFICATION
SPEECH RECOGNITION WITH LANGUAGE SPECIFICATIONSPEECH RECOGNITION WITH LANGUAGE SPECIFICATION
SPEECH RECOGNITION WITH LANGUAGE SPECIFICATION
IRJET Journal
 
IRJET- Voice Modulation and Verification for Smart Authentication System
IRJET- Voice Modulation and Verification for Smart Authentication SystemIRJET- Voice Modulation and Verification for Smart Authentication System
IRJET- Voice Modulation and Verification for Smart Authentication System
IRJET Journal
 
IRJET - Dual Verification ATM for Blind People
IRJET -  	  Dual Verification ATM for Blind PeopleIRJET -  	  Dual Verification ATM for Blind People
IRJET - Dual Verification ATM for Blind People
IRJET Journal
 
Voice Assistant Using Python and AI
Voice Assistant Using Python and AIVoice Assistant Using Python and AI
Voice Assistant Using Python and AI
IRJET Journal
 
IRJET - Threat Prediction using Speech Analysis
IRJET - Threat Prediction using Speech AnalysisIRJET - Threat Prediction using Speech Analysis
IRJET - Threat Prediction using Speech Analysis
IRJET Journal
 
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICES
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICESVOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICES
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICES
ijsptm
 
Authentication system with Decentralized chat app
Authentication system with Decentralized chat appAuthentication system with Decentralized chat app
Authentication system with Decentralized chat app
IRJET Journal
 
IRJET- Verbal Authentication for Personal Digital Assistants
IRJET- Verbal Authentication for Personal Digital AssistantsIRJET- Verbal Authentication for Personal Digital Assistants
IRJET- Verbal Authentication for Personal Digital Assistants
IRJET Journal
 
Biometric Ear Recognition System
Biometric Ear Recognition SystemBiometric Ear Recognition System
Biometric Ear Recognition System
IRJET Journal
 
Fingerprint Based Attendance System by IOT
Fingerprint Based Attendance System by IOTFingerprint Based Attendance System by IOT
Fingerprint Based Attendance System by IOT
IRJET Journal
 
IRJET - Hand Gestures Recognition using Deep Learning
IRJET -  	  Hand Gestures Recognition using Deep LearningIRJET -  	  Hand Gestures Recognition using Deep Learning
IRJET - Hand Gestures Recognition using Deep Learning
IRJET Journal
 
Voice Based Email System For Visual Impaired Using AI
Voice Based Email System For Visual Impaired Using AIVoice Based Email System For Visual Impaired Using AI
Voice Based Email System For Visual Impaired Using AI
IRJET Journal
 
IRJET - Voice based E-Mail for Visually Impaired
IRJET - Voice based E-Mail for Visually ImpairedIRJET - Voice based E-Mail for Visually Impaired
IRJET - Voice based E-Mail for Visually Impaired
IRJET Journal
 
IRJET- Data Transmission for Proximity Devices using Ultrasonic Sound Waves
IRJET- Data Transmission for Proximity Devices using Ultrasonic Sound WavesIRJET- Data Transmission for Proximity Devices using Ultrasonic Sound Waves
IRJET- Data Transmission for Proximity Devices using Ultrasonic Sound Waves
IRJET Journal
 
VOICE-BASED EMAIL SYSTEM FOR VISUALLY IMPAIRED PEOPLE
VOICE-BASED EMAIL SYSTEM FOR VISUALLY IMPAIRED PEOPLEVOICE-BASED EMAIL SYSTEM FOR VISUALLY IMPAIRED PEOPLE
VOICE-BASED EMAIL SYSTEM FOR VISUALLY IMPAIRED PEOPLE
IRJET Journal
 
VOICE-BASED EMAIL SYSTEM FOR VISUALLY IMPAIRED PEOPLE
VOICE-BASED EMAIL SYSTEM FOR VISUALLY IMPAIRED PEOPLEVOICE-BASED EMAIL SYSTEM FOR VISUALLY IMPAIRED PEOPLE
VOICE-BASED EMAIL SYSTEM FOR VISUALLY IMPAIRED PEOPLE
IRJET Journal
 

Similar to Voice-based Login System (20)

IRJET- Hearing Loss Detection through Audiogram in Mobile Devices
IRJET-  	  Hearing Loss Detection through Audiogram in Mobile DevicesIRJET-  	  Hearing Loss Detection through Audiogram in Mobile Devices
IRJET- Hearing Loss Detection through Audiogram in Mobile Devices
 
Interactive Voice Response System for College automation
Interactive Voice Response System for College automationInteractive Voice Response System for College automation
Interactive Voice Response System for College automation
 
Conversational Voice Controlled News Application
Conversational Voice Controlled News ApplicationConversational Voice Controlled News Application
Conversational Voice Controlled News Application
 
Autotuned voice cloning enabling multilingualism
Autotuned voice cloning enabling multilingualismAutotuned voice cloning enabling multilingualism
Autotuned voice cloning enabling multilingualism
 
SPEECH RECOGNITION WITH LANGUAGE SPECIFICATION
SPEECH RECOGNITION WITH LANGUAGE SPECIFICATIONSPEECH RECOGNITION WITH LANGUAGE SPECIFICATION
SPEECH RECOGNITION WITH LANGUAGE SPECIFICATION
 
IRJET- Voice Modulation and Verification for Smart Authentication System
IRJET- Voice Modulation and Verification for Smart Authentication SystemIRJET- Voice Modulation and Verification for Smart Authentication System
IRJET- Voice Modulation and Verification for Smart Authentication System
 
IRJET - Dual Verification ATM for Blind People
IRJET -  	  Dual Verification ATM for Blind PeopleIRJET -  	  Dual Verification ATM for Blind People
IRJET - Dual Verification ATM for Blind People
 
Voice Assistant Using Python and AI
Voice Assistant Using Python and AIVoice Assistant Using Python and AI
Voice Assistant Using Python and AI
 
IRJET - Threat Prediction using Speech Analysis
IRJET - Threat Prediction using Speech AnalysisIRJET - Threat Prediction using Speech Analysis
IRJET - Threat Prediction using Speech Analysis
 
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICES
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICESVOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICES
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICES
 
Authentication system with Decentralized chat app
Authentication system with Decentralized chat appAuthentication system with Decentralized chat app
Authentication system with Decentralized chat app
 
IRJET- Verbal Authentication for Personal Digital Assistants
IRJET- Verbal Authentication for Personal Digital AssistantsIRJET- Verbal Authentication for Personal Digital Assistants
IRJET- Verbal Authentication for Personal Digital Assistants
 
Biometric Ear Recognition System
Biometric Ear Recognition SystemBiometric Ear Recognition System
Biometric Ear Recognition System
 
Fingerprint Based Attendance System by IOT
Fingerprint Based Attendance System by IOTFingerprint Based Attendance System by IOT
Fingerprint Based Attendance System by IOT
 
IRJET - Hand Gestures Recognition using Deep Learning
IRJET -  	  Hand Gestures Recognition using Deep LearningIRJET -  	  Hand Gestures Recognition using Deep Learning
IRJET - Hand Gestures Recognition using Deep Learning
 
Voice Based Email System For Visual Impaired Using AI
Voice Based Email System For Visual Impaired Using AIVoice Based Email System For Visual Impaired Using AI
Voice Based Email System For Visual Impaired Using AI
 
IRJET - Voice based E-Mail for Visually Impaired
IRJET - Voice based E-Mail for Visually ImpairedIRJET - Voice based E-Mail for Visually Impaired
IRJET - Voice based E-Mail for Visually Impaired
 
IRJET- Data Transmission for Proximity Devices using Ultrasonic Sound Waves
IRJET- Data Transmission for Proximity Devices using Ultrasonic Sound WavesIRJET- Data Transmission for Proximity Devices using Ultrasonic Sound Waves
IRJET- Data Transmission for Proximity Devices using Ultrasonic Sound Waves
 
VOICE-BASED EMAIL SYSTEM FOR VISUALLY IMPAIRED PEOPLE
VOICE-BASED EMAIL SYSTEM FOR VISUALLY IMPAIRED PEOPLEVOICE-BASED EMAIL SYSTEM FOR VISUALLY IMPAIRED PEOPLE
VOICE-BASED EMAIL SYSTEM FOR VISUALLY IMPAIRED PEOPLE
 
VOICE-BASED EMAIL SYSTEM FOR VISUALLY IMPAIRED PEOPLE
VOICE-BASED EMAIL SYSTEM FOR VISUALLY IMPAIRED PEOPLEVOICE-BASED EMAIL SYSTEM FOR VISUALLY IMPAIRED PEOPLE
VOICE-BASED EMAIL SYSTEM FOR VISUALLY IMPAIRED PEOPLE
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
PrashantGoswami42
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
DuvanRamosGarzon1
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
MuhammadTufail242431
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 

Recently uploaded (20)

block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 

Voice-based Login System

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 538 Voice-based Login System Vedant Baviskar1, Shubham Bhagwat2, Deepjyoti Barman3, Gokul Viswanath4, Mrs. R.T. Waghmode 5 1,2,3,4,5 B.Tech student, Computer Science, Sinhgad Institute of Technology and Science, Pune, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - This project on Voice Authentication analyses audio to determine the identity of a user and authenticate them into a system while using Gaussian Mixture Models. This has a wide set of uses, from a normal web application to a high-security facility. Understanding how complex and high dimensional audio can be recognized is one a challenge. Audio data contains information that can be used effectivelyforinformationorcan be filtered out (in the case of our project) using Audio Content Analysis. This information includes background noise, crowd chatter and other noise like animals or cars. These reasons make audio recognition and classification a very challenging research topic. High dimensional audio can be exceedingly large in size and can pose problems to the speed of authentication and the performance impact on the devices used. So to solve this problem, we use audio formats such as MPEG to maintain the high level of detail in the audio clip, while also keeping the file size small. Key Words: High dimensional audio, Audio Content Analysis, Moving Pictures Expert Group, Gaussian Mixture Model 1. INTRODUCTION Voice Biometrics is a technology that relies on the recognition of voice patterns to verify the identity of individuals. This is possible as each person’s vocal tract is unique. Physical features, both phonetic and morphological are unique to each individual making them virtually fraud proof. It enables fast, frictionless and a very secure way to authenticate users. This process of authentication works in two steps, the first being the classification of the audio into speech and non- speech audio, the latter being music, noise and environment sounds. The second part starts by creating a list of characteristics that the trained model perceives from the voice, which is stored in an array. Then the user's characteristics that were saved during registering will be downloaded and used to compare both arrays. If thedistancebetween boththearrays is below a specific threshold value, then the user is authenticated. 1.1 RELEVANCE There are many areas that can use Biometric identification (in this case, Voice Authentication). The main areas this can be used are the ones where security is prioritized, ranging from a company login for admin tools to a high-security military checkpoint to watch border crossings at different frontiers. Higher ranked military forces canusethistoregulateentryto particular top-level facilities. Although the military is one main sector, even normal social media logins can be done using voice authentication, if they wish to. When a person is driving a vehicle, they can use systems that use Voice Authentication and recognition to use services while also keeping theireyesontheroad,thuscontributingto road safety. People with dyslexia would experience difficulties reading items on a screen and thus can use Voice Authentication to log in and use a service without much difficulty. 1.2 MOTIVATION As stated before, analysing and understanding multidimensional audio data is a big challenge. Using data from that analysis and implementing it in a real-timesystem is even more so. Such analyses and implementations can provide useful information to us about audio, and how they can beusedina wide range to applications that we use every day as part of our lifestyle. The voice is something you are, and uniquely defines you and your characteristics. This can help people and organizations introduce more such platforms that use Voice Authentication, and thus make the users' life easier while maintaining (or even strengthening) the level of security. 2. REQUIREMENTS Following are the requirements for the Voice Authentication system.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 539 1. Server side o Language – Python o Libraries – FastAPI, Fastdtw, OCI, Scipy, Ffmpeg-python, Numpy, Python-jose 2. Client-Side o Language - HTML, CSS, JavaScript o Libraries – React, Next, Axios, Recorder.js 3. Methodology In order to authenticate the voice, we first get the users voice sample. We take a base sample from the user, the first voice they upload, and we pass it through our feature extraction pipeline. After that we take at-least 4 more samples of the users voice and pass them through the same pipeline. This pipeline, at the end, returns a value that is between 0 and 1. This value indicates that the distance (or angle) between the two voices is most if the value is 0 and least if the value is 1. In other words, the larger the value, the closer two voice samples are. Once we take the users samples, we do a mean of all the values and determine an optimum value out of it. This value is what we use in order to compare the login voice sample. When a user tries to login, they pass a voice sample. This voice sample is also passed through the same pipeline and it is compared to the optimum value that we store. Depending on the result of the above comparison we either let the user login or not. The pipeline that we have built, does a few things. First step is to reduce the noise from the audio. We do this by utilizing a Python library that determines noise based on the frequency. Once we pass the audio through this, we pass it through another algorithm that returns a spectrogram of the audio. After this, we pass the second audio sample through the same above steps and we end up with a spectrogram as well. Once we have two spectrograms, we find the cosine similarity of the two spectrograms invariousplots.Thevalue of cosine similarity is between 0 and 1. Once we have the cosine similarity of various locations in the spectrogram, we find the mean of those values and get a single value. This value is the overall cosine similarity which is also between 0 and 1. This value indicates how close the two audio samples are. As explained above, depending on the above value, we either let the user log-in or show an error. Fig -1: Project Architecture 3. CONCLUSIONS During this project and the experiments we conducted during this project, we uncovered a few limitations. They are:  Recognizing a user's voice if it changes due to sickness, accent changes or speech patterns is a challenge.  Authentication speed and processing impactonthehost device, while being low, is still high compared to other techniques.  Because voice technology is easier to spoofascompared to other forms of biometric authentication, liveness detection tests needs to be used to verify if the user trying to log in is actually the user and not someone else trying to spoof the system. These limitations can definitely be solved in the future with advances in technology and the increase in the speed and power of processors, but currently hold back Voice Authentication in being a widespread authentication technology. As the years go by, the number of users of digital platforms for government services as well as the private sector services is increasing rapidly. Such a secure and foolproof authentication technique is a needed to ensurethatthelogin process is smooth and easy while also maintaining the same high level of security. As Voice authentication can uniquely identify an individual by their different traits i.e. identifying you by "who you are" and not by "what you have", it is becoming a widely used technique. Its low chance of failure and easy usage makes it an attractive option in systems around the world.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 540 ACKNOWLEDGEMENT We would like to thank our Head of Department Mrs. G. S. Navale, for giving us all the help and important suggestions all over the Seminar Work along with our internal guideMrs. R.T. Waghmode, for giving us guidance and support throughout the Seminar. Lastly, special thanks to our Principal Dr. S. D. Markande for providing ambience in the college, which motivate us to work. REFERENCES [1] Deep Learning for Audio Signal Processing - Hendrik Purwins∗, Bo Li∗, Tuomas Virtanen∗, Jan Schlüter∗, Shuo-yiin Chang, Tara Sainath, M. Young, The Technical Writer’s Handbook. Mill Valley, CA: University Science, 1989. [2] Unsupervised feature learning for audio classification using convolutional deep belief networks -Honglak Lee, Yan Largman, Peter Pham, Andrew Y. Ng [3] An Introduction to Audio Content Analysis Applications in Signal Processing and Music Informatics – Alexander Lerch [4] librosa: Audio and Music Signal Analysis in Python - Brian McFee, Colin Raffel,DawenLiang,Daniel P.W.Ellis, Matt McVicar, Eric Battenberg, Oriol Nieto [5] Biometric Audio Security – Lloyd Trammell, Lawrence Schwartz [6] Audio Data Analysis Using Deep Learning with Python (Part 1) - Nagesh Singh Chauhan BIOGRAPHIES Mrs. R.T. Waghmode is currently working as a Professor in Sinhgad Institute of Technology and Science, Narhe. Vedant Baviskar is a final-year B.E. student in Savitribai Phule Pune University. Gokul Viswanath is a final-year B.E. student in Savitribai Phule Pune University. Deepjyoti Barman is a final-year B.E. student in Savitribai Phule Pune University. Shubham Bhagwat is a final-year B.E. student in Savitribai Phule Pune University.