ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Secure Online Voting System Using Voice Activity Detection Algorithm in Biometrics

Journal: International Journal of Engineering and Techniques (Vol.3, No. 4)

Publication Date:

Authors : ;

Page : 134-139

Keywords : Biometrics; Voice activity detection (VAD) Algorithm; voice recognition.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

This paper concentrates on biometric based electronic voting machine. Biometric is utilized to recognize the individual depend on upon their physiological and behavioral characteristics. We utilize exclusive voice acknowledgment for ID. A voice acknowledgment framework is intended to distinguish a director voice. By using VB.NET programming for coding the voice acknowledgment, the executive voice can be confirmed. The key is to convert over the speech waveform to a sort of parametrically representation for further examination and preparing. An extensive variety of potential outcomes exist for parametrically speaking to the discourse motion for the voice recognition framework such as “V.A.D” (“Voice Activity Detection”). The input voice flag is recorded and PC will contrast the flag and the flag that is put away in the database by using VAD technique. The voice construct biometric recognition is based with respect to single word recognition. An administrator articulates the secret word once in the instructional course in order to prepare and put away. In testing session, the clients can express the secret key again with a specific end goal to accomplish acknowledgment if there is a match. By utilizing VB.NET programming, the yield can get either the client is being perceived or dismisses. From the consequence of testing the framework, it effectively perceives the particular client's voice and rejected other clients' voice. This paper deals with the exactness of the entire framework effectively perceiving the client's voice. It is a medium extent of the security level structure.

Last modified: 2018-05-19 18:24:26