speaker verification system in a security application hŪdatbrian bash thomas jonell dustin williams...
TRANSCRIPT
![Page 1: Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede](https://reader036.vdocuments.us/reader036/viewer/2022070401/56649f1e5503460f94c360f8/html5/thumbnails/1.jpg)
Speaker Verification System in a Security ApplicationHŪDAT Brian Bash
Thomas JonellDustin Williams
Advisor Dr. Les Thede
![Page 2: Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede](https://reader036.vdocuments.us/reader036/viewer/2022070401/56649f1e5503460f94c360f8/html5/thumbnails/2.jpg)
Executive Summary
Utilize voice verification in a security application
Interface with an electronic lock Be cost advantageous compared to other
solutions
![Page 3: Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede](https://reader036.vdocuments.us/reader036/viewer/2022070401/56649f1e5503460f94c360f8/html5/thumbnails/3.jpg)
Points of Interest
Problem Identification What are Biometrics? Constraints Project Layout Cost Analysis Gantt Chart Conclusion
![Page 4: Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede](https://reader036.vdocuments.us/reader036/viewer/2022070401/56649f1e5503460f94c360f8/html5/thumbnails/4.jpg)
Problem Identification
What?Desire to control access to a secure room by
means other than a traditional keycard or passcode
Why?Traditional methods can be compromised
![Page 5: Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede](https://reader036.vdocuments.us/reader036/viewer/2022070401/56649f1e5503460f94c360f8/html5/thumbnails/5.jpg)
Biometrics
Growing Field of Technology Identification of individualsUses biological traitsExamples:
Retinal or Iris Scanning Fingerprints Facial Recognition
![Page 6: Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede](https://reader036.vdocuments.us/reader036/viewer/2022070401/56649f1e5503460f94c360f8/html5/thumbnails/6.jpg)
Applicable Biometrics
Facial Recognition Time consuming Difficult to implement Accurate
Voice Verification Quick Easier implementation Not as accurate
![Page 7: Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede](https://reader036.vdocuments.us/reader036/viewer/2022070401/56649f1e5503460f94c360f8/html5/thumbnails/7.jpg)
Voice Biometrics
Speech Recognition Program as a stenographer
Speech to text programs
Speaker Verification Used in security
Does not care what you say Concerned about the nature of your voice
![Page 8: Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede](https://reader036.vdocuments.us/reader036/viewer/2022070401/56649f1e5503460f94c360f8/html5/thumbnails/8.jpg)
Constraints
Economic Utilize standard parts Limiting software developing packages Keep price competitive
Manufacturability Utilize standard parts
Sustainability Proper documentation Sufficiently commented code
![Page 9: Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede](https://reader036.vdocuments.us/reader036/viewer/2022070401/56649f1e5503460f94c360f8/html5/thumbnails/9.jpg)
Constraints cont.
Health and Safety Debug for all feasible scenarios Manual override
Political / Ethical Future – abuse of collected bio-data General scope: no concerns
Environmental and Social No foreseen impact
![Page 10: Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede](https://reader036.vdocuments.us/reader036/viewer/2022070401/56649f1e5503460f94c360f8/html5/thumbnails/10.jpg)
Design
Computer-driven Microphone Audio Processing Program Locking Mechanism
![Page 11: Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede](https://reader036.vdocuments.us/reader036/viewer/2022070401/56649f1e5503460f94c360f8/html5/thumbnails/11.jpg)
Block Diagram
Interface / Power Supply
Microphone Computer ID
Electric Door Lock
User
System Admin.
![Page 12: Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede](https://reader036.vdocuments.us/reader036/viewer/2022070401/56649f1e5503460f94c360f8/html5/thumbnails/12.jpg)
Programming Language
MATLABA very diverse program written in CMany built in functions Intuitive interfaceDigital Signal Processing (DSP) applications
![Page 13: Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede](https://reader036.vdocuments.us/reader036/viewer/2022070401/56649f1e5503460f94c360f8/html5/thumbnails/13.jpg)
Voice Verification Program
Voice Recorder Voiced/Unvoiced Detection Voice Analysis Testing
![Page 14: Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede](https://reader036.vdocuments.us/reader036/viewer/2022070401/56649f1e5503460f94c360f8/html5/thumbnails/14.jpg)
Voice Recorder
Sampled at 11025Hz for 5 seconds Stored in WAV format Naming Convention
Lower case lettersFirst initial followed by last nameEx: tjonell.wav
![Page 15: Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede](https://reader036.vdocuments.us/reader036/viewer/2022070401/56649f1e5503460f94c360f8/html5/thumbnails/15.jpg)
Voiced/Unvoiced Detection
Enhance voice sample with autocorrelation.
Detect spoken portions using enhanced voice sample.
Split voice sample into spoken portions only.
![Page 16: Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede](https://reader036.vdocuments.us/reader036/viewer/2022070401/56649f1e5503460f94c360f8/html5/thumbnails/16.jpg)
tjonell.wav with Autocorrelation
![Page 17: Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede](https://reader036.vdocuments.us/reader036/viewer/2022070401/56649f1e5503460f94c360f8/html5/thumbnails/17.jpg)
Voice Analysis
Power Spectral Density (PSD)The concentration of power at specific
frequencies. Formants
Characteristic resonant region in the PSD of a sound.
![Page 18: Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede](https://reader036.vdocuments.us/reader036/viewer/2022070401/56649f1e5503460f94c360f8/html5/thumbnails/18.jpg)
Voice Testing
Compare the relative locations of formants in each word.
A weighted score is created.This is based upon how closely a person’s
voice matches their reference sample.
![Page 19: Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede](https://reader036.vdocuments.us/reader036/viewer/2022070401/56649f1e5503460f94c360f8/html5/thumbnails/19.jpg)
bbash vs. brian2
![Page 20: Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede](https://reader036.vdocuments.us/reader036/viewer/2022070401/56649f1e5503460f94c360f8/html5/thumbnails/20.jpg)
bbash vs. tjonell
![Page 21: Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede](https://reader036.vdocuments.us/reader036/viewer/2022070401/56649f1e5503460f94c360f8/html5/thumbnails/21.jpg)
Lock Circuit
1
3 9
7
4 10
6 12
13119 16
468 1
2N2222Anpn BJT
10uF
120V AC60Hz
1N4001
IlluminatedRocker Switch
Low SignalRelay
Step-Down Transformer120VAC to 12.6VAC
SERIAL LINE (RS232)9 pin D-Type
LEEElectric
DoorStrike
8-16VAC3-6VDC
50 Ohm
2A Fuse
15AFuse
![Page 22: Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede](https://reader036.vdocuments.us/reader036/viewer/2022070401/56649f1e5503460f94c360f8/html5/thumbnails/22.jpg)
Text-based User Interface
******************************* * * * Welcome to the * * Hudat Security System * * * ******************************* Please begin by entering your user name: bbash When you are ready to begin, press any key and recitethe passphrase slowly into the microphone. PROCESSING... Access granted. Welcome.
![Page 23: Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede](https://reader036.vdocuments.us/reader036/viewer/2022070401/56649f1e5503460f94c360f8/html5/thumbnails/23.jpg)
Cost Analysis
Computer System $800MATLAB (reusable) $1,900MATLAB Signal Processing Toolbox (reusable) $800MATLAB Compiler (reusable) $2,700Lock & Components $100Development ($20/hr, 3 people) $28,800TOTAL $35,100
Break-Even MSRP (per unit) $450Profit MSRP (33% profit per unit) $600
![Page 24: Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede](https://reader036.vdocuments.us/reader036/viewer/2022070401/56649f1e5503460f94c360f8/html5/thumbnails/24.jpg)
Gantt Chart
![Page 25: Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede](https://reader036.vdocuments.us/reader036/viewer/2022070401/56649f1e5503460f94c360f8/html5/thumbnails/25.jpg)
Conclusion
Biometrics answer increased demand for security.
Voice verification is very practical. MATLAB is ideal for this application. Lock circuit allows communication
between program and a door lock.
![Page 26: Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede](https://reader036.vdocuments.us/reader036/viewer/2022070401/56649f1e5503460f94c360f8/html5/thumbnails/26.jpg)
Question & Answer Session