26
Speaker Verification System in a Security Application HŪDAT Brian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede

Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede

Embed Size (px)

Citation preview

Page 1: Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede

Speaker Verification System in a Security ApplicationHŪDAT Brian Bash

Thomas JonellDustin Williams

Advisor Dr. Les Thede

Page 2: Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede

Executive Summary

Utilize voice verification in a security application

Interface with an electronic lock Be cost advantageous compared to other

solutions

Page 3: Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede

Points of Interest

Problem Identification What are Biometrics? Constraints Project Layout Cost Analysis Gantt Chart Conclusion

Page 4: Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede

Problem Identification

What?Desire to control access to a secure room by

means other than a traditional keycard or passcode

Why?Traditional methods can be compromised

Page 5: Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede

Biometrics

Growing Field of Technology Identification of individualsUses biological traitsExamples:

Retinal or Iris Scanning Fingerprints Facial Recognition

Page 6: Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede

Applicable Biometrics

Facial Recognition Time consuming Difficult to implement Accurate

Voice Verification Quick Easier implementation Not as accurate

Page 7: Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede

Voice Biometrics

Speech Recognition Program as a stenographer

Speech to text programs

Speaker Verification Used in security

Does not care what you say Concerned about the nature of your voice

Page 8: Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede

Constraints

Economic Utilize standard parts Limiting software developing packages Keep price competitive

Manufacturability Utilize standard parts

Sustainability Proper documentation Sufficiently commented code

Page 9: Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede

Constraints cont.

Health and Safety Debug for all feasible scenarios Manual override

Political / Ethical Future – abuse of collected bio-data General scope: no concerns

Environmental and Social No foreseen impact

Page 10: Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede

Design

Computer-driven Microphone Audio Processing Program Locking Mechanism

Page 11: Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede

Block Diagram

Interface / Power Supply

Microphone Computer ID

Electric Door Lock

User

System Admin.

Page 12: Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede

Programming Language

MATLABA very diverse program written in CMany built in functions Intuitive interfaceDigital Signal Processing (DSP) applications

Page 13: Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede

Voice Verification Program

Voice Recorder Voiced/Unvoiced Detection Voice Analysis Testing

Page 14: Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede

Voice Recorder

Sampled at 11025Hz for 5 seconds Stored in WAV format Naming Convention

Lower case lettersFirst initial followed by last nameEx: tjonell.wav

Page 15: Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede

Voiced/Unvoiced Detection

Enhance voice sample with autocorrelation.

Detect spoken portions using enhanced voice sample.

Split voice sample into spoken portions only.

Page 16: Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede

tjonell.wav with Autocorrelation

Page 17: Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede

Voice Analysis

Power Spectral Density (PSD)The concentration of power at specific

frequencies. Formants

Characteristic resonant region in the PSD of a sound.

Page 18: Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede

Voice Testing

Compare the relative locations of formants in each word.

A weighted score is created.This is based upon how closely a person’s

voice matches their reference sample.

Page 19: Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede

bbash vs. brian2

Page 20: Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede

bbash vs. tjonell

Page 21: Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede

Lock Circuit

1

3 9

7

4 10

6 12

13119 16

468 1

2N2222Anpn BJT

10uF

120V AC60Hz

1N4001

IlluminatedRocker Switch

Low SignalRelay

Step-Down Transformer120VAC to 12.6VAC

SERIAL LINE (RS232)9 pin D-Type

LEEElectric

DoorStrike

8-16VAC3-6VDC

50 Ohm

2A Fuse

15AFuse

Page 22: Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede

Text-based User Interface

******************************* * * * Welcome to the * * Hudat Security System * * * ******************************* Please begin by entering your user name: bbash When you are ready to begin, press any key and recitethe passphrase slowly into the microphone. PROCESSING... Access granted. Welcome.

Page 23: Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede

Cost Analysis

Computer System $800MATLAB (reusable) $1,900MATLAB Signal Processing Toolbox (reusable) $800MATLAB Compiler (reusable) $2,700Lock & Components $100Development ($20/hr, 3 people) $28,800TOTAL $35,100

Break-Even MSRP (per unit) $450Profit MSRP (33% profit per unit) $600

Page 24: Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede

Gantt Chart

Page 25: Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede

Conclusion

Biometrics answer increased demand for security.

Voice verification is very practical. MATLAB is ideal for this application. Lock circuit allows communication

between program and a door lock.

Page 26: Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede

Question & Answer Session