EchoSafe: AI-Powered Scam Voiceprint Detection Platform
π Protecting financial institutions and their customers from voice-based fraud in real time.
π Project Overview EchoSafe is a full-stack, AI-driven platform designed to help banks and organizations detect and stop scam calls before they cause harm. Built during the Spring 2025 St. Johnβs University ACM x Headstarter Hackathon, EchoSafe combines secure audio processing, voiceprint fingerprinting, and intelligent search capabilities to identify known scammers quickly and accurately.
The system securely processes .mp3 and .wav recordings, generates unique voice fingerprints using AI algorithms, and compares them against a database of previously identified scammer profiles. If a match is found, EchoSafe instantly flags the call, providing early warnings that can save financial institutions β and their customers β from costly fraud attempts.
π‘ Key Features π AI Voiceprint Matching β Creates unique digital fingerprints of voices for accurate scammer detection.
π Secure Audio Uploads β Accepts .mp3 and .wav files with validation to prevent malicious uploads.
β‘ Fast Searching β Quickly find matching scammer voiceprints in the database.
π§ Audio Playback β Review suspicious call recordings directly in the platform.
π‘οΈ Real-Time Alerts β Flags known scammers for immediate fraud prevention.
π Scalable Database β Built on MySQL for efficient storage and retrieval of thousands of voiceprints.
π Tech Stack Backend: Python, Flask
Database: MySQL
Frontend: HTML, CSS, JavaScript
File Handling: Secure .mp3/.wav processing with validation
Deployment: Localhost (Hackathon build), future cloud deployment planned
π Hackathon Achievement Placed 1st out of 25+ teams at the Spring 2025 SJU ACM x Headstarter Hackathon.
Processed 150+ test scam recordings during the competition.
Delivered a working MVP in under 48 hours.
π₯ Team Members
π Installation
git clone https://github.com/Javo79code/EchoSafe.git
cd EchoSafe
pip install -r requirements.txt
python app.py
π€ Contributing Contributions are welcome! Please fork the repo and submit a pull request for any enhancements. Then visit http://localhost:5000 in your browser.