Internet & Web

A Security System based on Face and Speech Authentication

Description
A Security System based on Face and Speech Authentication
Categories
Published
of 31
All materials on our website are shared by users. If you have any questions about copyright issues, please report us to resolve them. We are always happy to assist you.
Related Documents
Share
Transcript
    A Security System based onFace and Speech Authentication A ReportSubmitted in Partial Fulfillment of the RequirementsFor the Degree of   Bachelor of Engineering  In Electronics and Electrical Communications Engineering   By Paramveer Singh Dhillon   Contents 1. Introduction …………………………………………………… (7-8)2. Face and Speech Authentication Software Module………… (9-20) 2.1 Face Authentication Module…………………………………….. 9-16 2.1.1 State of the Art in Face Recognition………………………………… 10-11   2.1.2 Problems encountered in Face Recognition………………………….. 12-132.1.3 EigenFace Approach to Face Recognition…………………………... 14-16  2.2 Speech Authentication Module…………………………………… 17-20 2.2.1 General Approach used for Speech Recognition……………………... 17-192.2.2 Vocabulary of our System and implementation details………………. 20   3. Hardware Module and PC Parallel Port Interface…………. (21-24) 3.1   Hardware Module………………………………………………... 21 3.1.1 Circuit Diagram……………………………………………………….. 213.1.2 Datasheets of Components used………………………………………. 21 3.2 PC Parallel Port Interface………………………………………… 22-24 3.2.1 Specifications of PC Parallel Port……………………………………... 22-23   3.2.2 Parallel Port support in  MATLAB ™………………………………….. 244   4. Results and Conclusions………………………………………. (25-26)Appendix A. Source Codes (MATLAB/ 8051 μ C)…………………………. (27-30)  B. Cost Analysis…………………………………………………. (31)References………………………………………………………… (32) 5   List of Figures Fig. 1: Same image in two different illumination conditions (drastic change)………….......... 13 Fig. 2 : Images of two persons with varying facial expressions……………………………….. 13 Fig. 3: A subset of the training images used to create Eigen Space for Face Recognition…... 14 Fig. 4: A typical block for ‘S’ phone………………………………………………………….. 18 Fig. 5: FFT Plot of sound signal………………………………………………………………. 19 Fig. 6: Parallel Port DB 25 connector and its layout………………………………………….. 22 Fig. 7: Details of parallel port signal lines…………………………………………………….. 23 Fig. 8: Graph showing the performance of Face and Speech Recognition Modules………….. 26 Fig. 9: Graph showing the performance of the complete System…………………………….. 266   Chapter 1   Introduction Due to the rapid progress made in Artificial Intelligence and allied fields(e.g. Computer Vision, Machine Learning, Speech Processing, Natural Language Processing and Neural Networks) in the last three decades, it has been made possible to build autonomousintelligent systems.One such motivation has been to build a security system based on faceauthentication. It is a very challenging task because the Face detection systems are very sensitiveto: •   Pose Variation •   Illumination conditions •   Partial or full occlusions •   Image Orientation •   Facial Expressions Next we consider the case of a speech authentication system. In this case problems faced are plenty and may outnumber those faced in Face Recognition. The main problems faced are due to omnipresent noise which may interfere with the sound signal, the pitchof different humans also vary greatly lastly speech processing systems are very sensitive todifferent accents and inflections used by people belonging to different demographic locations.As a part of our senior year major project we have endeavored to build a securitysystem based on Face and Speech Authentication. Security is embedded in two stages in thesystem. The face authentication system constitutes the first stage and speech authenticationconstitutes the second stage.In the first stage the system takes the image of the face of the user, if user is oneof the persons who is allowed to enter the system then the face authentication system gives the“green signal” (turns on green LED) and the control of the system passes to the second stage of the system i.e. the speech authentication system.In the second stage the user who has passed the first level of security i.e. the faceauthentication system, is required to speak a password (any word from the List 1 given onPage 20) within a certain time frame, if the password is correct then the user has passed thesecond authentication also and a second “green signal” is given to imply that the user is one of the “authorized” persons to enter the system.In all other cases i.e. the cases in which the user  •   Fails at first level of authentication •   Passes at First Level and Fails at Second Level7
Search
Tags
Related Search
We Need Your Support
Thank you for visiting our website and your interest in our free products and services. We are nonprofit website to share and download documents. To the running of this website, we need your help to support us.

Thanks to everyone for your continued support.

No, Thanks
SAVE OUR EARTH

We need your sign to support Project to invent "SMART AND CONTROLLABLE REFLECTIVE BALLOONS" to cover the Sun and Save Our Earth.

More details...

Sign Now!

We are very appreciated for your Prompt Action!

x