CELLPHONE PROTECTION USING VOICE RECOGNITION
#1

Presented by:
S,Mohan Tamizhmani & M.Manuel Jude Vinoth

[attachment=11679]
ABSTRACT
Cellular communication industry has grown leaps and bounds to become the essence of day to day science. Cell phone is the heart of cellular industry. The number of cell phone users is growing exponentially. But the privacy of user and security of cell phone remains a challenging question.
Stealing cell phone has become the eye catching business for culprits. There should be a reliable method of protecting the instrument from burglars. Our paper proposes a new innovative, reliable, fool proof security measure for cell phones using VOICE RECOGNITION.
Voice recognition is the identification of an individual identity using speech as the identifying characteristic. The voice of the user is processed (Speech Processing) using a digital signal processor which is the prime part of a cell phone. We are programming this DSP to implement this protection technique.
Firstly an original voice database of the user is created. This database is stored in the Flash ROM(8M) which is available inside the cell phone. Then whenever the user speaks through the cell phone part of the speech sample is taken and encoded. This processed voice of the user is compared with the original database to check the identity of the user. If the user is authorized, he is allowed to continue his talk. If not the transmission is cut abruptly by making the MP in idle state. Thus the cell phone is being protected from any unauthorized user. Even if the cell phone was stolen or missed it won’t be useful for any other person.
The programmability of DSP and universality of Voice based identification has given our method a dual advantage. Our proposal demands neither external hardware nor extra cost. The above method possess no hardship for the user unlike the present security systems. This method can be adopted universally in all models of Cell phones for protection.
INTRODUCTION
The word Cell Phone has become the greatest buzz word in the Cellular Communication Industry. The threat for cell phones is also increasing. Stealing a cell phone and selling them in black market has grown into a profiting business. Hence there arises a need to adopt a fool proof security system to prevent these unlawful activities, unauthorized usage and safeguard the user. Our paper tells about a new system of Cell phone protection using Voice Recognition.
VOICE RECOGNITION BY BIOMETRICS
Voice recognition is the identification or verification of an individual identity using speech as the identifying characteristic. There is no attempt in voice recognition to necessarily identify the content, or speech, of a sound-stream, merely to identify its auditory and vocal characteristics. An individual speech spectrum is of the form as shown here.
In this case the sound signal is digitized and then the digitized signal is compared to previously recorded samples held in a database. The result is a simple yes/no decision as to whether the speaker has been identified. A diagram of a typical voice recognition process is shown in Figure 1.
Voice biometrics works by digitizing a profile of a person's speech to produce a stored model voice print, rather like a template, which is referred to each time that person attempts to access secure data. Biometrics technology reduces each spoken word into segments: sub-word like syllables, phonemes, triphones or similar units of sound, composed of several dominant frequencies called formants, which remain relatively constant over that segment. Each segment has three or four dominant tones that can be captured in digital form and plotted on a table or spectrum.
When a person speaks his or her passphrase, the code word or words are extracted and compared to the stored model for that person. When a user attempts to gain access to protected data, their passphrase is compared to the previously stored voice model and all other voice prints stored in the database.
CELL PHONE ARCHITECTURE
The basic internal architecture cell phone mainly consists of the following parts.
 Kernel which is nothing but a microprocessor.
 Vocoder is a DSP (Digital Signal Processor).
 Memory (SRAM, Flash ROM & EEPROM)
 RF interface for transmitting and receiving of data.
 System clock (an oscillator producing frequency)
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: cell phone protection using voice recognition abstract, voice recognition project using matlab, download complete discription of cellphone based device control with voice acknowledgement, voice recognition using matlab project pdf, voice recognition using 8051, cellphone protection using voice recognition ppt, industrial automation using cellphone projects of 8051,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Voice Based Automated Transport Enquiry System seminar class 2 3,188 05-10-2016, 09:34 AM
Last Post: ijasti
  Color Iris Recognition Using Quaternion Phase Correlation matlab project project topics 3 3,435 02-07-2016, 09:38 AM
Last Post: visalakshik
  STUDY OF SUBSTATION EQUIPMENT AND PROTECTION smart paper boy 2 4,078 26-07-2015, 07:10 AM
Last Post: AlbertDodo
  Cellphone-Operated Land Rover projectsofme 5 4,889 06-07-2015, 02:56 PM
Last Post: seminar report asees
  Isolated word speaker independent speech recognition project computer science technology 4 4,475 23-05-2014, 06:56 PM
Last Post: seminar report asees
  A neural network based artificial vision system for licence plate recognition on reception projectsofme 2 2,765 27-07-2013, 11:57 AM
Last Post: computer topic
  GENERATOR PROTECTION IN BPCL-KOCHI full report project report tiger 2 3,814 01-12-2012, 12:23 PM
Last Post: seminar details
  TRANSFORMER PROTECTION USING NUMERICAL RELAY full report project report tiger 7 14,626 30-11-2012, 01:31 PM
Last Post: seminar details
  Transformer Protection Principles seminar class 1 2,098 30-11-2012, 01:30 PM
Last Post: seminar details
  An Automatic Hand Gesture Recognition System Based on Viola-Jones Method and SVMs seminar class 1 3,595 22-11-2012, 12:00 PM
Last Post: seminar details

Forum Jump: