# Introduction he implementation of access control prevents unauthorized individuals to access secure areas, buildings, documents and services. The control system consists of two main stages namely, the identification and verification stages. People that want to access a secure facilities introduce themselves to the system in the identification stage and the verification stage check the validity of the identities of the introduced users. If the identity of the user is valid, then the user may access secure area with the assigned permissions. The access control system is used for numerous applications such as for logging on ATM machines, e-banking accounts or for physical security of a room or building as a whole [1]. Access control for buildings is an essential device for protecting important places in the building that have valuable or highly sensitive materials. Server and strong room of banks are important areas where extremely effective control system is required. There ways of security implementation in a building and door access control is an integral part of them. The door access control is a means of securing building by giving limited access to specific people and by keeping records of such accesses [2]. Smartcard according to [2,3] is the most common authentication method for the door access controls. It has been observed that a cardbased access system can only control the access of authorized cards that are pieces of plastic, but not the ownership of the card. It can be used illegitimately by an unauthorized person when in possession of it. Furthermore, systems using PINs require individual to enter specific numbers to gain entry but the shortcoming is that those who really enters the codes cannot be determined system. The limitations of conventional security systems call for better ones. There are varieties of biometric methods that could be employed in access control system for verification of authorized person into important or sensitive places. An automatic verification of identity in terms of behavioral and/or physiological characteristics of a person is carried out in the biometric methods [2,3]. The biometric device identifies people by certain unique features such as the fingerprint, voice, face and eye (iris). Additionally, the device can eliminate the need for card-based access system. In the light of this, biometric devices can reduce the need for reissue of lost or damaged cards as the fingerprint, voice, face and eye are rarely stolen or lost. The advantages of voice as a biometrics method are expatiated in [2] among which are simplicity for the user, speed of authentication and level of falserejection rate. To resolve problems of the PINs pads and smartcards-based door access control, this paper presents voice-based door access control system using the Mel Frequency Cepstrum and Gaussian mixture model for building security. The paper is organized as follows. Section 2 describes the proposed system. Section 3 focuses on system design and implementation. Results and performance evaluation are discussed in section 4. Conclusions are drawn in section 5. In the following sections, we will quickly go through feature extraction and Gaussian Mixture Model. Next, we look at the operation and implementation of the voice based door control system and finally, we present performance evaluation and results. # Proposed System Research in speaker recognition and speech recognition is presently mature. Speaker recognition is essentially used in access control systems to give access to individuals whose identities are validated from their previously stored voice records or models. This involves both speaker identification and speaker verification [4]. It is, however, different from speech recognition which relies on the shared characteristic of what is said and what is stored in order to make a decision. Both are employed in speaker identification independent speaker identification and verification process where the phrase or word to be said is not known to the system. The design is implemented in two parts namely the software and the hardware parts. For the software, we use the Mel Frequency Cepstral Coefficients (MFCCs) for feature extraction and the Gaussian Mixture Model (GMM) for template matching. We use MFCCs because they are very robust and are the dominant features used for speech recognition [6]. Also, GMMs are usually preferred because they offer high classification accuracy while still being robust to corruptions in the speech signal. Also, they are very successful when it comes to noise handling. This has led to the extensive use of GMM based speaker recognition systems. The hardware part uses such components as d.c. motors, the L293B H-Bridge integrated circuit, a parallel port and the door structure. # a) Feature Extraction The intention here is to have a model of the speech waveform that is sufficiently an accurate representation to the speech. It has been observed that the speech signal is a slowly time varying signal (quasistationary). This means that when observed over a sufficiently short period of time (between 5 and 100 ms), its characteristics are fairly stationary but change over long periods (0.2s or more) in order to reflect the different sounds being spoken. Therefore, to characterize the speech signal, the Mel Frequency Cepstral Coefficients (MFCCs) which is a tool for short time spectral analysis is employed. We refer to [6] for a complete description of the procedures for obtaining the MFCCs features. In this work, the programming platform used for voice processing and software development is MATLAB. # b) Gaussian Mixture Model In [7][8][9][10], a Gaussian Mixture Model is described as a weighted sum of M component Gaussian densities given by the equation, ??(??|??) = ? ð??"ð??" ?? ð??"ð??"(??|?? ?? , ?? ?? ) ?? ??=1 Where ?? is a D-dimensional continuous-valued data vector (measurement or features)ð??"ð??" ?? , ?? = 31, ? , ??, are the mixture weights, and ð??"ð??"(??|?? ?? , ?? ?? ), ?? = 1, ? , ??, are the component Gaussian densities with mean vectors ?? ?? and covariance matrices ?? ?? . Each component density is D-variate Gaussian function of the form, ð??"ð??"(??|?? ?? , ?? ?? ) = ?????? ?? 1 2 (?? ? ?? ?? ) ? ? (?? ? ?? ?? ) ?1 ?? ? (2??) ?? 2 ? |?? ?? | 1 2 # ? The mixture weights satisfy the constraint that ? ð??"ð??" ?? ?? ??=1 = 1. The parameters of the complete Gaussian model are collectively represented by the notation, ?? = {ð??"ð??" ?? , ?? ?? , ?? ?? } ?? = 1, ? , ??. In training the GMM, these parameters are estimated such that they best match the distribution of the training vectors [Fuzzy mixture Model for Speaker Recognition]. # III. # System Design and Implementation The process begins with the recording and training of voice samples otherwise called enrolment, which could be done either in real time or using a prerecorded sample. A database for each of these samples exists such that any newly recorded speech would be saved there and not be lost either before or after the recognition process. For optimal results as in this case, it is very important that the recorded speech be obtained through the same means and if possible, processes every time. This is because the intrinsic properties of different microphones vary and could greatly affect the quality of the signal and the recognition system in general. It is in this process that the analogue speech signal is converted to a digital signal by sampling. The analogue signal is conditioned with anti-aliasing filtering (and additional filtering if required to compensate for any channel impairments). The anti-aliasing filter limits the bandwidth of the signal to approximately the Nyquist rate (half the sampling rate) before sampling. This digitized speech is then further analyzed to extract the features that would be used for the recognition algorithm. Figure 1 shows the series of processes that the voice samples would undergo for a typical case where a verified I.D is enrolled and its model is subsequently compared with the features of a claimed I.D. The hardware of this project is designed and built using a simple door prototype made with wood (plywood) having two DC motors. The DC motors are lightweight and consume less power, which implies that the batteries would last much longer. These motors provide the needed rotational displacement for the door to open and they are controlled by an H-Bridge IC (L293B). This IC is in turn driven directly by the parallel port of the system connected via a parallel port cable and controlled through MATLAB. # IV. Results and Performance Evaluation A total of seven (7) voice samples from ten (10) different speakers that are recorded through the same process and at a sampling rate of 88.2KHzis used for the performance evaluation. Since this system is not a text-dependent system, the voice samples are varied from names to numbers depending on the choice of the speaker. Furthermore, in assessing the system performance with respect to accuracy and reliability, we use the false accept rate and the false reject rate. Therefore, out of ten (10) (5) The lower the False reject rate, the higher the efficiency of any biometric system. Additionally, this test also proves the efficacy of the given system. The performance of the Automated Speaker Recognition is summarized in table 1. V. # Conclusions This paper has described the design of a voice activated door control system. We have used the MFCCs for feature extraction while the GMM is used for pattern matching. We have also shown that the door control system could easily be assembled using cheap and easily available materials. Analysis of the results using standard performance metrics such as FAR and FRR produced accuracy (genuine acceptance probability) of more than 80%, which is high when compared with existing access control schemes. ![Volume XIV Issue IV Version I II.](image-2.png "F") 1RecognitionFAR (%)FRR (%)Speaker 12010Speaker 2020Speaker 3300Speaker41020Speaker 55040Speaker 62030Speaker 71010 © 2014 Global Journals Inc. (US) © 2014 Global Journals Inc. (US) (2) (3) (1)and verification systems[5]. This paper uses a text * EDovgan BKalu?a TTu?ar MGams Agentbased Security System for User Verification, International Joint Conference on Web Intelligence and Intelligent Agent Technology 2009 * Intelligent Voice-Based Door Access Control System Using Adaptive-Network-based Fuzzy Inference Systems (ANFIS) for Building Security WAWahyudi MSyazilawati Journal of Computer Science 3 5 2007 * SYKung MWMak SHLin Biometric Authentication: Machine Learning Approach Prentice Hall 2004 * Recent advances in speaker recognition SFurui Patter Recognition Letters 18 1997 * Speaker Recognition: a Tutorial JPCampbell Proceedings of the IEEE 85 9 1997 * SirkoMolau MichaelPitz RalfSchl¨uter HermannNey Computing Mel Frequency Cepstral Coefficients on the Power Spectrum 2001 ICASSP * Fuzzy Normalization Methods for Speaker Verification DTran MWagner Proc. ICSLP2000 ICSLP2000Beijing, China 2000 1 * A Proposed Likelihood Transformation for Speaker Verification DTran MWagner Proc. ICASSP2000 ICASSP2000Turkey 2000 2 * Pattern Recognition with Fuzzy Objective Function Algorithms JCBezdek 1987 Plenum Press New York * Uncertain Rule-based Fuzzy Logic Systems: Introduction and New Directions JMMendel 2001 Prentice-Hall Upper Saddle River, NJ * Global Journal of Researches in Engineering