[ieee international conference on computational intelligence and multimedia applications (iccima...

3
Mobile Phones Security Using Biometrics H.Abdul Shabeer Suganthi.P student, lecture, Sona College of Tech., Sona college of technology, Salem. Salem. [email protected] Abstract Stealing cell phone has become the eye catching business for culprits. There should be a reliable method of protecting the instrument from burglars. Our paper proposes a new innovative, reliable, fool proof security measure for cell phones using VOICE RECOGNITION and FINERPRINT RECOGNITION. Our proposal demands neither external hardware nor extra cost. The above methods possess no hardship for the user unlike the present security systems. This method can be adopted universally in all models of Cell phones for protection. 1. Introduction The word Cell Phone has become the greatest buzz word in the Cellular Communication Industry. The threat for cell phones is also increasing. Stealing a cell phone and selling them in black market has grown into a profiting business. Hence there arises a need to adopt a fool proof security system to prevent these unlawful activities, unauthorized usage and safeguard the user. Our paper tells about a new system of cell phone protection using biometrics. 1.1 Voice recognition by biometrics Voice recognition is the identification or verification of an individual identity using speech as the identifying characteristic. In this case the sound signal is digitized and then the digitized signal is compared to previously recorded samples held in a database. The result is a simple yes/no decision as to whether the speaker has been identified. A diagram of a typical voice recognition process is shown in Figure 1. Figure: 1 Voice recognition process Speech Digitization Voice Characteristic Analysis Voice Characteristics Database Process Match Process Not Match Yes Match No International Conference on Computational Intelligence and Multimedia Applications 2007 0-7695-3050-8/07 $25.00 © 2007 IEEE DOI 10.1109/ICCIMA.2007.182 270 International Conference on Computational Intelligence and Multimedia Applications 2007 0-7695-3050-8/07 $25.00 © 2007 IEEE DOI 10.1109/ICCIMA.2007.182 270

Upload: p

Post on 20-Dec-2016

217 views

Category:

Documents


0 download

TRANSCRIPT

Mobile Phones Security Using Biometrics

H.Abdul Shabeer Suganthi.P student, lecture, Sona College of Tech., Sona college of technology, Salem. Salem. [email protected]

Abstract

Stealing cell phone has become the eye catching business for culprits. There should be a reliable method of protecting the instrument from burglars. Our paper proposes a new innovative, reliable, fool proof security measure for cell phones using VOICE RECOGNITION and FINERPRINT RECOGNITION. Our proposal demands neither external hardware nor extra cost. The above methods possess no hardship for the user unlike the present security systems. This method can be adopted universally in all models of Cell phones for protection.

1. Introduction The word Cell Phone has become the greatest buzz word in the Cellular Communication Industry. The threat for cell phones is also increasing. Stealing a cell phone and selling them in black market has grown into a profiting business. Hence there arises a need to adopt a fool proof security system to prevent these unlawful activities, unauthorized usage and safeguard the user. Our paper tells about a new system of cell phone protection using biometrics. 1.1 Voice recognition by biometrics

Voice recognition is the identification or verification of an individual identity using speech as the identifying characteristic. In this case the sound signal is digitized and then the digitized signal is compared to previously recorded samples held in a database. The result is a simple yes/no decision as to whether the speaker has been identified. A diagram of a typical voice recognition process is shown in Figure 1.

Figure: 1 Voice recognition process

Speech Digitization

Voice Characteristic Analysis

Voice Characteristics Database

Process Match Process Not Match

Yes

Match No

International Conference on Computational Intelligence and Multimedia Applications 2007

0-7695-3050-8/07 $25.00 © 2007 IEEEDOI 10.1109/ICCIMA.2007.182

270

International Conference on Computational Intelligence and Multimedia Applications 2007

0-7695-3050-8/07 $25.00 © 2007 IEEEDOI 10.1109/ICCIMA.2007.182

270

When a person speaks his or her pass phrase, the code word or words are extracted and compared to the stored model for that person. When a user attempts to gain access to protected data, their pass phrase is compared to the previously stored voice model and all other voice prints stored in the database. 2. Our work 2.1 Protection using voice recognition In our paper the main idea is that when a user buys a cell phone he has to record his voice (only some portion) in the cell phone. For each person the Phoneme (The smallest unit of speech that differentiates one utterance from another in any spoken language or dialect.) is unique. The frequency spectrum of speech signal is encoded by means of Vocoder. This coded signal is stored in the internal system memory the flash ROM (8M). The coding and storing of speech spectrum is in figure 2

Figure: 2 Coding and Storing Of Speech

The microprocessor is programmed such that it sends a control signal to the vocoder

saying it to code the incoming voice input. The MP sends the address and a control signal to the memory saying that it should store the coded signal in Flash ROM. 2.2 Validation of voice After this initial coding and storage of voice input, whenever the user starts using the cell his /her speech (for the first 3 seconds speech) spectrum will be coded and this will be compared with the coded spectrum stored in the Flash ROM. If this matches with the voice stored in the database then the Vocoder (DSP) will send a command signal to the MP unit telling that the user is an authorized user. But the RF part will keep on transmitting the signal. If the spectrum doesn’t produce any match then DSP sends a negative command to MP to stop the transmission of signal by making the MPU to be in inactive state. Thus the cell phone is being protected from any unauthorized user. Even if the cell phone being theft or missed it won’t be useful for any other person. Here we are taking the frequency spectrum because the amplitude spectrum varies with the amplitude of speech signal. If the person speaks in shrill voice or in angry mood then the amplitude varies. Hence we are going for frequency spectrum since the frequency will be constant irrespective of amplitude.

3. Protection using fingerprint technologies In the figure 3 we propose a secured mobile phone method which helps in reduction

of mobile phones theft, increase in security and it also prevent unauthorized user accessing the mobile. The block diagram of secured mobile phone is shown in figure 3.

VOCODER (DSP)

1011010 MEMORY (FLASH ROM)

271271

Figure: 3 Finger print recognition

When user wants to purchase the mobile, the mobile manufacture has to take the finger print of the owner and it must be stored permanently in the database of the mobile. The database here can be either ROM or Smart cards. This image will be used in future for the verification of the authorized user.

Whenever the user wants to operate mobile, he/she should press is thumb on the scanner.

Once the scanner catch the user’s thumb it will be stored in an EPROM (temporary memory). This thumb impression is compared with original or permanent thumb impression which is stored in ROM by using image comparator. If both of the impression matches, it sends a signal to MEMS (MicroelectroMechanicalsystem) motors which help in opening the door of the mobile. If an impression fails to match, then corresponding signal will be generated from image comparator, which in turn helps in glowing red LED (Light Emitting Diode).For this operation of battery of 1.5 volts is required. 4. Conclusion

We can’t think of a communication world without cell phones. The future is going to be more advanced and sophisticated cell phones will be common. Since Prevention is better than Cure, it is better to prevent Cell phone theft than being stolen. The above protection system proposed by our paper has its unique advantage than any other existing Systems. This method can be adopted universally to protect mobile phones. 5. References [1] Khalil Ahmed ,Royal Saudi Naval Forces Riyadh, Saudi Arabia. “Biometric Security” IEP-SAC journal 2002- 2003. [2] Jain .A. Bolle BIOMETRICS: Personal Identification in Networked Society [3] Biometric Consortium Website (http://www.biometrics.org) [4] Avanti Website (http://www.jsoft.freeuk.com)

Thumb scanner

EPROM(5K)

Image

comparator ROM

Memsstepper motor

Mobile open automatically

Red led on

Battery of

1.5v

272272