Implementation of a Two-Level Security Door Access Using Keypad and Voice Recognition

Morkat M. Yilwatda, J. A. Enokela, N. Goshwe
{"title":"Implementation of a Two-Level Security Door Access Using Keypad and Voice Recognition","authors":"Morkat M. Yilwatda, J. A. Enokela, N. Goshwe","doi":"10.14257/ijsia.2017.11.4.04","DOIUrl":null,"url":null,"abstract":"It is possible today to automate a growing number of speaker-recognition tasks with such technologies as voice or speaker verification and voice identification. These systems have been applied to real-world security applications. They have, however, been undergoing modifications due to the poor level of security architecture that they provide to users. Hence there is the need, as has been done in this work, to develop a more efficient, user friendly and complex security system that can curtail illegal intrusion into special facilities. The system described in this paper uses matrix keypad which is interfaced with a microcontroller for first level security validation to monitor and control the execution of desired tasks within the keypad and voice recognition (KVR) system. A voice recognition Integrated Circuit is used for second level security verification. A tristate buffer is also employed to logically isolate the buses of the digital signal processing (DSP) chip and those of the microcontroller. From the research, tests were conducted for both noiseless and noisy environments and the recommended distance between the user and microphone in a noiseless environment using electrets type condenser microphone is 1.0 cm to 16 cm while under noisy condition it was found to be 1.0 cm to 6.0 cm. These results depend on the sensitivity of the microphone and the environmental conditions at the time. It can be deduced from the research that integrating the keypad and voice recognition design can help to optimize the security level of the system and by implication help in controlling unwanted intrusion into the special facilities such as museum, military armory, financial institution, etc.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2017-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Security and Its Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.14257/ijsia.2017.11.4.04","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

It is possible today to automate a growing number of speaker-recognition tasks with such technologies as voice or speaker verification and voice identification. These systems have been applied to real-world security applications. They have, however, been undergoing modifications due to the poor level of security architecture that they provide to users. Hence there is the need, as has been done in this work, to develop a more efficient, user friendly and complex security system that can curtail illegal intrusion into special facilities. The system described in this paper uses matrix keypad which is interfaced with a microcontroller for first level security validation to monitor and control the execution of desired tasks within the keypad and voice recognition (KVR) system. A voice recognition Integrated Circuit is used for second level security verification. A tristate buffer is also employed to logically isolate the buses of the digital signal processing (DSP) chip and those of the microcontroller. From the research, tests were conducted for both noiseless and noisy environments and the recommended distance between the user and microphone in a noiseless environment using electrets type condenser microphone is 1.0 cm to 16 cm while under noisy condition it was found to be 1.0 cm to 6.0 cm. These results depend on the sensitivity of the microphone and the environmental conditions at the time. It can be deduced from the research that integrating the keypad and voice recognition design can help to optimize the security level of the system and by implication help in controlling unwanted intrusion into the special facilities such as museum, military armory, financial institution, etc.
使用键盘和语音识别实现两级安全门禁
如今,利用诸如语音或说话者验证和语音识别之类的技术,可以使越来越多的说话者识别任务自动化。这些系统已应用于现实世界中的安全应用程序。然而,由于它们为用户提供的安全体系结构级别较差,它们一直在进行修改。因此,正如在这项工作中所做的那样,有必要开发一个更高效、用户友好和复杂的安全系统,以减少对特殊设施的非法入侵。本文中描述的系统使用矩阵键盘,该键盘与用于一级安全验证的微控制器接口,以监控和控制键盘和语音识别(KVR)系统内所需任务的执行。语音识别集成电路用于二级安全验证。三态缓冲器也用于逻辑隔离数字信号处理(DSP)芯片的总线和微控制器的总线。根据研究,对无噪声和有噪声环境进行了测试,在使用驻极体型电容式麦克风的无噪声环境中,用户与麦克风之间的推荐距离为1.0厘米至16厘米,而在有噪声的条件下,建议距离为1.0 cm至6.0厘米。这些结果取决于麦克风的灵敏度和当时的环境条件。研究表明,将键盘和语音识别设计相结合有助于优化系统的安全级别,并有助于控制对博物馆、军事军械库、金融机构等特殊设施的不必要入侵。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
International Journal of Security and Its Applications
International Journal of Security and Its Applications COMPUTER SCIENCE, INFORMATION SYSTEMS-
自引率
0.00%
发文量
0
期刊介绍: IJSIA aims to facilitate and support research related to security technology and its applications. Our Journal provides a chance for academic and industry professionals to discuss recent progress in the area of security technology and its applications. Journal Topics: -Access Control -Ad Hoc & Sensor Network Security -Applied Cryptography -Authentication and Non-repudiation -Cryptographic Protocols -Denial of Service -E-Commerce Security -Identity and Trust Management -Information Hiding -Insider Threats and Countermeasures -Intrusion Detection & Prevention -Network & Wireless Security -Peer-to-Peer Security -Privacy and Anonymity -Secure installation, generation and operation -Security Analysis Methodologies -Security assurance -Security in Software Outsourcing -Security products or systems -Security technology -Systems and Data Security
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信