Title
Protection of Mobile Phone by Voice Recognition: Approach to Identify Culprits
Abstract
Stealing cell phone has become the eye catching business for culprits. There should be a reliable method for protecting the instrument from burglars. Our paper proposes a new innovative, reliable, fool proof security measure for cell phones using VOICE RECOGNITION. Voice recognition is the identification of an individual identity using speech as the identitiing characteristic. The voice of the user is processed (Speech Processing) using a digital signal processor which is the prime part of a cell phone. We are programming this DSP to implement this protection technique. At first, an original voice database of the user is created. This database is stored in the Flash ROM (8M) which is available inside the cell phone. Then whenever the user speaks through the cell phone part of the speech sample is taken and encoded. This processed voice of the user is compared with the original database to check the identity of the user. If the user is authorized, he is allowed to talk. If not the transmission is cut abruptly by making the microprocessor (MP) go. to idle state. Thus the cell phone is being protected from any unauthorized use. Even if the cell phone is stolen or misplaced, it won't be of any use to the other person. In order to find the culprit, the voice sample which is initially stored in ROM should be the same as in the network/service provider library. The culprits can be found by comparing the voice samples ix., by comparing the sample that is stored in the network /service provider library with the voice sample taken from the user initial speech (temporary memory).Once the mismatch occur the sample which is stored in temporary memory is transmitted to the network provider. Using these samples, it is possible for the network provider to find the culprit -by comparing the obtained sample with the samples which is stored in network/service provider library. Our proposal demands neither external hardware nor extra cost. The above methods possess no hardship for the user unlike the present security systems. This method can be adopted universally in all models of Cell phones for protection.
Year
Venue
Keywords
2007
Lecture Notes in Engineering and Computer Science
mobile phones,voice recognition,security
Field
DocType
ISSN
Mobile identification number,Voice Tag,Computer science,Speech recognition,GSM services,Mobile phone
Conference
2078-0958
Citations 
PageRank 
References 
0
0.34
1
Authors
3
Name
Order
Citations
PageRank
H. Abdul Shabeer101.01
S. Anand200.34
V. Sakthivel300.34