Affiliation:
1. Mepco Schlenk Engineering College, India
Abstract
Security is the most notable fact of all computerized control gadgets. In this chapter, a voice ID computerized gadget is utilized for the security motivation using speech recognition. Mostly, the voices are trained by extracting mel frequency cepstral coefficient feature (MFCC), but it is very sensitive to noise interference and degrades the performance; hence, dynamic MFCC is used for speech and speaker recognition. The registered voices are stored in a database. When the device senses any voice, it cross checks with the registered voice. If any mismatches occur, it gives an alert to the authorized person through global system for mobile communication (GSM) to intimate the unauthorized access. GSM works at a rate of 168 Kb/s up to 40 km and it operates at different operating frequencies like 800MHz, 900MHz, etc. This proposed work is more advantageous for the security systems to trap the unauthorized persons through an efficient communication.
Reference27 articles.
1. Euclidean Distance Distortion Based Robust and Blind Mesh Watermarking
2. Banerjee, Chakraborty, Dey, Pal, & Ray. (2015, February). High Payload Watermarking using Residue Number System. I.J. Image, Graphics and Signal Processing, 1-8.
3. Biswas, D., Das, P., Maji, P., Dey, N., & Chaudhuri, S. S. (2013). Visible watermarking within the region of non-interest of medical images based on fuzzy c-means nd harris corner detection. ICCSEA, SPPR, CSIA, WimoA, 161–168.
4. Chen & Chien. (2011). Flexible Hardware Architecture of Hierarchical K-Means Clustering for Large Cluster Number. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 19(8).
5. Memory‐efficient buffering method and enhanced reference template for embedded automatic speech recognition system