Wireless Enhanced Security Based on Speech Recognition

Security is the most notable fact of all computerized control gadgets. In this chapter, a voice ID computerized gadget is utilized for the security motivation using speech recognition. Mostly, the voices are trained by extracting mel frequency cepstral coefficient feature (MFCC), but it is very sensitive to noise interference and degrades the performance; hence, dynamic MFCC is used for speech and speaker recognition. The registered voices are stored in a database. When the device senses any voice, it cross checks with the registered voice. If any mismatches occur, it gives an alert to the authorized person through global system for mobile communication (GSM) to intimate the unauthorized access. GSM works at a rate of 168 Kb/s up to 40 km and it operates at different operating frequencies like 800MHz, 900MHz, etc. This proposed work is more advantageous for the security systems to trap the unauthorized persons through an efficient communication.

[1]  Arun Kumar Sangaiah,et al.  Configuring a Trusted Cloud Service Model for Smart City Exploration Using Hybrid Intelligence , 2017, Int. J. Ambient Comput. Intell..

[2]  Nilanjan Dey,et al.  A Session Based Blind Watermarking Technique within the NROI of Retinal Fundus Images for Authentication Using DWT, Spread Spectrum and Harris Corner Detection , 2012, 1209.0053.

[3]  Nilanjan Dey,et al.  Euclidean Distance Distortion Based Robust and Blind Mesh Watermarking , 2016, Int. J. Interact. Multim. Artif. Intell..

[4]  Longbiao Wang,et al.  Speaker Identification and Verification by Combining MFCC and Phase Information , 2009, IEEE Transactions on Audio, Speech, and Language Processing.

[5]  Q. P. Rana,et al.  Trust based Dynamic Multicast Group Routing Ensuring Reliability for Ubiquitous Environment in MANETs , 2017, Int. J. Ambient Comput. Intell..

[6]  Dimitrios Dimitriadis,et al.  Spectral Moment Features Augmented by Low Order Cepstral Coefficients for Robust ASR , 2010, IEEE Signal Processing Letters.

[7]  Ta-Wen Kuan,et al.  Trainable and Low-Cost SMO Pattern Classifier Implemented via MCMC and SFBS Technologies , 2015, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[8]  Shintaro Izumi,et al.  A 40 nm 144 mW VLSI Processor for Real-Time 60-kWord Continuous Speech Recognition , 2012, IEEE Trans. Circuits Syst. I Regul. Pap..

[9]  Ta-Wen Kuan,et al.  Memory-efficient buffering method and enhanced reference template for embedded automatic speech recognition system , 2015, IET Comput. Digit. Tech..

[10]  Nilanjan Dey,et al.  Medical Information Embedding in Compressed Watermarked Intravascular Ultrasound Video , 2013, ArXiv.

[11]  Goutam Saha,et al.  Real time implementation of speaker identification system with frame picking algorithm , 2010, Biometrics Technology.

[12]  Shao-Yi Chien,et al.  Flexible Hardware Architecture of Hierarchical K-Means Clustering for Large Cluster Number , 2011, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[13]  Debi Prasanna Acharjya,et al.  A Comparative Study of Statistical and Rough Computing Models in Predictive Data Analysis , 2017, Int. J. Ambient Comput. Intell..

[14]  Himansu Das,et al.  A Survey on Virtual Sensor Networks Framework , 2014 .

[15]  Nilanjan Dey,et al.  Intelligent Techniques in Signal Processing for Multimedia Security , 2017 .

[16]  Jing Zhang,et al.  A speaker model clustering method based on space position , 2016 .

[17]  Aurobinda Routray,et al.  A novel approach of speech emotion recognition with prosody, quality and derived features using SVM classifier for a class of North-Eastern Languages , 2015, 2015 IEEE 2nd International Conference on Recent Trends in Information Systems (ReTIS).

[18]  Nilanjan Dey,et al.  Stationary Wavelet Transformation Based Self-recovery of Blind-Watermark from Electrocardiogram Signal in Wireless Telecardiology , 2012, SNDS.

[19]  Ta-Wen Kuan,et al.  VLSI Design of an SVM Learning Core on Sequential Minimal Optimization Algorithm , 2012, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[20]  Adnan Ahmed Abi Sen,et al.  Improving Privacy and Security of User Data in Location Based Services , 2018, Int. J. Ambient Comput. Intell..

[21]  Nilanjan Dey,et al.  Analysis of P-QRS-T Components Modified by Blind Watermarking Technique Within the Electrocardiogram Signal for Authentication in Wireless Telecardiology Using DWT , 2012 .

[22]  Nilanjan Dey,et al.  VISIBLE WATERMARKING WITHIN THE REGION OF NON -INTEREST OF MEDICAL IMAGES BASED ON FUZZY C-MEANS AND HARRIS CORNER DETECTION , 2013 .

[23]  Nilanjan Dey,et al.  High Payload Watermarking using Residue Number System , 2015 .

[24]  Himansu Das,et al.  A Novel PSO Based Back Propagation Learning-MLP (PSO-BP-MLP) for Classification , 2015 .