CFP last date
20 May 2024
Reseach Article

A Novel Method for Identifying the Keyless Authentication Entry System using Mobile for Auto Mobiles (CAR)

by V. Murali Krishna, Y. Mallikarjuna Reddy
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 51 - Number 7
Year of Publication: 2012
Authors: V. Murali Krishna, Y. Mallikarjuna Reddy
10.5120/8052-1398

V. Murali Krishna, Y. Mallikarjuna Reddy . A Novel Method for Identifying the Keyless Authentication Entry System using Mobile for Auto Mobiles (CAR). International Journal of Computer Applications. 51, 7 ( August 2012), 6-12. DOI=10.5120/8052-1398

@article{ 10.5120/8052-1398,
author = { V. Murali Krishna, Y. Mallikarjuna Reddy },
title = { A Novel Method for Identifying the Keyless Authentication Entry System using Mobile for Auto Mobiles (CAR) },
journal = { International Journal of Computer Applications },
issue_date = { August 2012 },
volume = { 51 },
number = { 7 },
month = { August },
year = { 2012 },
issn = { 0975-8887 },
pages = { 6-12 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume51/number7/8052-1398/ },
doi = { 10.5120/8052-1398 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:49:45.111167+05:30
%A V. Murali Krishna
%A Y. Mallikarjuna Reddy
%T A Novel Method for Identifying the Keyless Authentication Entry System using Mobile for Auto Mobiles (CAR)
%J International Journal of Computer Applications
%@ 0975-8887
%V 51
%N 7
%P 6-12
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile technology plays a vital role in modern era. In the emerging trend of speech technologies, speech/non-speech detection is an unsolved problem, which affects numerous speech related applications. One of the major reasons for these thefts is the unauthenticated access to the car doors and engine. Recently the Remote keyless system emerged for users to operate their cars without keys. For identifying the speech signal, Automatic speech recognition is used. It identifies the signal from the particular person with the help of Voice Active Detector (VAD). It is widely used within the field of speech communication for achieving high speech coding efficiency and low-bit rate transmission. These identify the signal and prioritize the unwanted noise signal using Hidden Markov Model (HMM). In our system, we propose a novel way for keyless entry enabled through mobile phone. The user can dial a specific number connected to the car and can give voice commands. The system built in the car receives the voice commands, goes for voice recognition & authentication. By employing Mel Frequency Cepstral Coefficients (MFCC) processor, the speech will be recognized. After positive authentication, it obeys the command of the car owner. The normal operation based on voice commands are Car Door Lock/Unlock, Engine ON/OFF etc.

References
  1. Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak Patel, and Tadayoshi Kohno," Experimental Security Analysis of a Modern Automobile," IEEE Symposium on Security and Privacy (SP), pp. 447- 462, 2010.
  2. Xiao Ni, Weiren Shi and Victor Foo Siang Fook. " AES Security Protocol Implementation for Automobile Remote Keyless System," IEEE Conference on Vehicular Technology , pp. 2526 - 2529, Apr 2007.
  3. Hisashi Oguma, Naoki Nobata, Kazunari Nawa, Tsutomu Mizota and Mitsuru Shinagawa," Passive Keyless Entry System for Long Term Operation, IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, pp. 1-3, Jun 2011.
  4. Rozeha A. Rashid, Nur Hija Mahalin, Mohd Adib Sarijari and Ahmad Aizuddin Abdul Aziz," Security System Using Biometric Technology: Design and Implementation of Voice Recognition System (VRS)," In Proc. of the International Conference on Computer and Communication Engineering, Jul 2008
  5. Dr. V. Radha, Ms. Vimala. C and Ms. M. Krishnaveni," An Efficient Voice Activity Detection Method for Automatic Tamil Speech Recognition System using VADSOHN Algorithm," IEEE International Conference on Communication Control and Computing Technologie (ICCCCT), pp. 597- 602, Dec 2010.
  6. Wei Li, Dong-Ju Kim, Chul-Hwan Kim and Kwang-Seok Hong," Voice-Based Recognition System for Non-Semantics Information by Language and Gender," Third International Symposium on Electronic Commerce and Security, pp. 84-88, 2010.
  7. Amitava Das, Ohil K. Manyam , Makarand Tapaswi and Veeresh Taranalli," Multilingual spoken-password based user authentication in emerging economies using cellular phone networks," IEEE Spoken Language Technology Workshop, pp. 4-8, 2008.
  8. Nihat Ozturk and Ulvi Unozkan," Microprocessor Based Voice Recognition System Realization," International Conference on Application of Information and Communication Technologies (AICT), pp. 1-3, Aug 2010.
  9. Syazilawati Mohamed and Wahyudi Martono," Design of Fusion Classifiers for Vo ice-Based Access Control System of Building Security," World Congress on Computer Science and Information Engineering, 2009.
  10. Sunil Kumar Kopparapu," A Robust Speech Biometric System for Vehicle Access," International conference on Vehicular Electronics and Safety (ICVES), pp. 174 - 177, Nov 2009.
  11. Stéphane Dupont and Juergen Luettin," Audio-Visual Speech Modeling for Continuous Speech Recognition," IEEE Transactions on multimedia, Vol. 2, No. 3, pp. 141- 151, Sep 2000.
  12. Humaid Al Shueili, Gourab Sen Gupta and Subhas Mukhopadhyay," Voice Recognition Based Wireless Home Automation System," International Conference on Mechatronics, May 2011.
  13. . Bo Cui and Tongze Xue," Design and Realization of an Intelligent Access Control System Based on Voice Recognition," International Colloquium on Computing, Communication, Control, and Management, pp. 229-232, 2009.
  14. Hyeopwoo Lee, Sukmoon Chang, Dongsuk Yook and Yongserk Kim," A Voice Trigger System using Keyword and Speaker Recognition for Mobile Devices," IEEE Transactions on Consumer Electronics, Vol. 55, No. 14, pp. 2377 - 2384, Nov 2009.
  15. Naoto Yamasaki and Tetsuya Shimamura," Accuracy Improvement of Speaker Authentication in Noisy Environments Using Bone-Conducted Speech," IEEE International Midwest Symposium on Circuits and Systems (MWSCAS), pp. 197 - 200 2010.
  16. Simon Thompson, Yoko Sasak and Satoshi Kagami," Associating Spoken Commands with Multiple Human Users in a Dynamic Environment," International Conference on Intelligent Sensors, Sensor Networks and Information Processing, pp. 207- 212, Dec 2008.
  17. Feng Zhu, Matt W. Mutka and Lionel M. Ni," Private Entity Authentication for Pervasive Computing Environments," International Journal of Network Security, Vol. 14, No. 2, pp. 86-100, Mar. 2012.
  18. Tomi Kinnunen and Haizhou Li," An Overview of Text-Independent Speaker Recognition: from Features to Super vectors," Speech Communication, Vol. 52, No. 1, pp. 12- 40. Jan 2010.
  19. Alexander Klimm, Benjamin Glas, Matthias Wachs, Sebastian Vogel, Klaus D. Muller Glaser and Jurgen Becker," A Security Scheme for Dependable Key Insertion in Mobile Embedded Devices," International Journal of Reconfigurable Computing, Vol. 2011, pp. 1-19, 2011.
  20. P. C. van Oorschot," Message Authentication by Integrity with Public Corroboration," In Proc. of the 2005 workshop on New security paradigms, 2005
  21. S. A. R. Al-Haddad, S. A. Samad, A. Hussain, K. A. Ishak and A. O. A. Noor," Robust Speech Recognition Using Fusion Techniques andAdaptive Filtering," American Journal of Applied Sciences, Vol. 6, No. 2, pp. 290-295, 2009.
  22. Oytun Türk, Osman Büyük, Ali Haznedaroglu and Levent M. Arslan," Application of Voice Conversion for Cross-Language Rap Singing Transformation," IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 3597 - 3600, Apr 2009.
  23. Keith Vertanen, Per Ola Kristensson," Recognition and Correction of Voice Web Search Queries," In Proc. of the International Conference on Spoken Language Processing, 2009.
  24. Matthew Maverick Loper, Nathan P. Koenig, Sonia Chernova, Chris V. Jones, Odest Chadwicke Jenkins. Mobile human-robot teaming with environmental tolerance. In Proc. Of HRI, pp. 157-164, 2009.
  25. Tanzeem Choudhury, Gaetano Borriello and Dirk Haehnel," The Mobile Sensing Platform: An Embedded Activities Recognition System," PERVASIVE computing, pp. 32-41, Jun 2008.
  26. J. Ramírez, J. M. Górriz and J. C. Segura," Voice Activity Detection. Fundamentals and Speech Recognition System Robustness, System, pp. 1-22, 2007.
  27. Josef Rajnoha, Petr Pollák, ASR systems in Noisy Environment: Analysis and Solutions for Increasing Noise Robustness," Radio Engineering, Vol. 20, NO. 1, Apr 2011.
  28. Hyeopwoo Lee; Sukmoon Chang; Dongsuk Yook; Yongserk Kim; "A voice trigger system using keyword and speaker recognition for mobile devices" IEEE Transactions on Consumer Electronics, 2009 IEEE.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile Technology Automatic Speech Recognition (ASR) Hidden Markov Model (HMM) Mel Frequency Cepstral Coefficients (MFCC) processor