CellPhone Protection Ppt Seminars

Published on May 2016 | Categories: Documents | Downloads: 39 | Comments: 0 | Views: 212
of 16
Download PDF   Embed   Report

Comments

Content

CONTENTS
Introduction Need for cell phone protection Existing security measures Biometric authentiction Voice recognition Cell phone architecture Heart of cell phone

INTRODUCTION
• Our paper proposes a new innovative, reliable, fool proof security measure for cell phones using VOICE RECOGNITION • The voice of the user is processed (Speech Processing) using a digital signal processor which is the prime part of a cell phone

NEED FOR PROTECTION
• The threat for cell phones is also increasing. Stealing a cell phone and selling them in black market has grown into a profiting business. • There arises a need to adopt a fool proof security system to prevent these unlawful activities, unauthorized usage and safeguard the user.

EXISTING SECURITY MEASURES
> PASSWORD • A password should never be written down, never be given to another person, and should be changed at least every three months. • Besides these, a sedative technician can break these passwords and PIN numbers

VOICE RECOGNITION
• Voice recognition is the identification or verification of an individual identity using speech as the identifying characteristic. • To identify its auditory and vocal characteristics. An individual speech spectrum is of the form as shown here.

SPEECH AMPLITUDE SPECTRUM

VOICE I/P

1011011 VOICE SPEECH CHARACTERISTICS DIGITIZATION ANALYSIS

VOICE CHARACTERISTICS DATABASE

SEARCH /MATCHING RESULTS

NO MATCH

YES

PROCESS MATCH

PROCESS NO MATCH

CELL PHONE ARCHITECTURE
Kernel which is nothing but a microprocessor. Vocoder is a DSP (digital signal processor). Memory (SRAM, Flash RAM,ROM,&EEPROM) RF interface for transmitting and receiving of data. Base band interface. System clock (an oscillator producing frequency) SIM card interface.

VOCODER (DSP) I/P SPECTRUM

1011010

MOMORY (Flash memory)

CODING AND STORING OF SPEECH SPECTRUM

FREQUENCY

TIME GOOD MORNING AUDIO SPECTRUM

TRANSMISSION
AUTHORISED USER

UNAUTHORISED USER

NO TRANSMISSION

COMPARATIVE ANALYSIS

Biometric trait
VOICE

Feature
Tone or timbre

sensor
Microphone

Costs

Comfort

Accuracy

Very low

Very Easy

High

IRIS Ear form

Iris pattern

camera

Very high High High

Very Difficult Difficult

Very high High High

Dimension of camera Visible ear

Measurement HAND camera Of fingers GEOMETRY & palm Rhythm of Keyboard strokes

Easy

KEY board strokes

Key-board

Very low

Easy

Very low

MERITS OF OUR PROPOSED SYSTEM
No external hardware. No increase in cost of cell phone. No difficulty for user (as he talks as usual). Programming is easy. Burglar proof. Protection from unauthorized usage. Can be used for all models of cell phones

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close