Speech Pattern Security System

advertisement
Secret Knock Door Opener
I. PROJECT OVERVIEW
Last semester, the “Spoiler Alert” developed a mechanism to open a door using only a rhythmic sequence. To extend this
poject, and make it more difficult, a new technique must be developed: Voice Recognition. The merit for this project is that I
occasionally find myself outside my (locked) front door, but without the key. Help me open my door by sensing when I knock
on it with a “teachable” pattern.
II. PROJECT DIAGRAM
Speak a Code
Phrase, or say
a vowel
Anayze and
compare to
preset
Actuate Door
release
III. REQUIREMENTS




Develop a system that can distinguish a specific entity using voice pattern security
System must be able to work at varying tempos and pitches within a specific range.
The method of actuation should be user programmable.
Illuminate an LED upon successful passcode recognition
IV. MIDTERM DEMONSTRATION GRADING
Points
20
30
60
110
Requirement
Microcontroller can identify peak frequencies in the segment of
speech using a DFFT
Microcontroller can sample and store a 1 second segment of speech
Microphone circuit can recognize in the speech range with filters to
remove sounds outside the range of normal speech
Total Points
V. FINAL DESIGN PRESENTATION GRADING
Points
10
20
20
60
110
Requirement
Project cost kept under $150.
Other group members or the professor cannot open the door using
the same password (password uniquely identifies voice pattern)
A new password can be stored by another group member or the
professor and it will open, even when spoken in a different
manner.
One group member can uniquely open the door using a password
Total Points
VI. PROJECT POINTERS




Each human voice has a unique pattern. Determine the best way to identify this pattern first
The discreet Fourier transform has advantages and disadvantages. It may be useful to sample higher than you need
for more accuracy of the transform.
Many of the problems may be in the programming. Be sure you have someone capable of thinking algorithmically
for this project.
Other student-engineers have created similar projects. It is acceptable to use others’ information; just be sure to
credit your sources.
Download