Abstract

Along with the rapid development of informatization, people habitually rely on electronic devices. For the convenience and efficiency provided by various devices, people could dispose almost everything by their phones and PC. In this respect, the security of the electronic devices that people use in daily life becomes much more important. In this area, exerts has tried many ways to keep data and uses safe from attacks. This paper has designed a Voice Based Biometric Security System, which is able to reinforce the security level of the target device. With its help, the electronic devices will be more security.

Highlights

  • Different Protections in Different StagesThe method of providing protection for a specific goal changes over time and technological innovation

  • Background Noise ReductionBackground noise is a major factor contributing to the difficulties in analyzing voice signals

  • The voice signal from the user will get through Mel-frequency Cepstral Coefficients (MFCC) filter which attenuate most signal that cannot be heard by human ear because of too high frequency, and display the Mel-Frequency Spectrum (MFC) coefficient value in time domain

Read more

Summary

Different Protections in Different Stages

The method of providing protection for a specific goal changes over time and technological innovation. People use keys to lock doors and use digital cards to enter buildings [2]. The third degree of the level of security is the biometric authentication It uses biometric identifiers which are the distinctive, and measurable characteristics used to label and describe individuals to identify people. It is the most strength and efficient selective restriction of access method so far. It would never be lost or forgotten and nearly impossible to be stolen by anybody [5]. The only key to the biometric locker is based on the pattern of behavior of the user [6]

System Functional Design Specifications
System Implementation
Alternate Designs or Issues and Solutions Considered
Time Domain Analysis
Analysis and Applicability of Constraints
Validation and Future Improvements
Matrix Stretching Error and Its Considered Solution
Uncontrollable Noise Error
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call