Voice Biometric, A New Trend to Enhance Security
Keywords:
Voice Biometric, CERT-I, Master & VISA, million Master & VISA, MASTER cardAbstract
Security has always been a primary concern whether be it home or of fice. With the advent of information technology security over the infor mation acquired takes a prime concern. Security breaches are prevailing from technical to business field. Information technology has inundated the business sector and education world and every possible area one can think of. Consider the case of CERT-I n where, Hours ahead of its planned protest against certain incidents of internet censorship in India , hacker collective Anonymous attacked and brought down the website run by Computer Emergency Response Team India (CERT-I n). Amongst the most disastrous information leakage breach was the hacking of data for 1.5 million Master & VISA card users. VISA & MASTER card alerts banks about the security breach at Global Payments. The alert clearly stated that full Track 1 & Track 2 information was taken and could have been abused for counterfeit new cards. This information had been com promised from a period of January 21,2012 to February 25,2012. Yet it was not the company who disclosed the security breach, the security blogger Brian Krebs in security reported the event on 30,March,2012, This pattern is common for all security breaches as the conclusion who are impacted are the last ones to know about it. These threats to business need a stronger mechanism of security to counter them. Biometrics has offered new venues to resolve these issues.Biometrics refers to the physiological or behavioural characteristics of a person to authenticate his/her identity. This Biometrics is the most prominent and promising technique used for authenticating a person’s identity. Voice Biometrics, Finger printing, facial Recognition area few biometrics that are used for security purposes. This paper majorly cover Voice Biometrics. voice biometrics uses the pitch, tone, and rhythm of speech. Background noise, illness, age, and differences in telephones and microphones can cause problems with voice identification and au thorization.[Paper: exploration - voice -biometrics_1436] This is mostly used by Banks and Call Centres to authenticate there users. A telephone or microphone is required to proved your identity. Voice Biometrics is mostly adopted by the customers as they find it as a normal telephonic conversation. Remotely any customer from any location can login or use his/her ID. Each person has a unique voice and that can be easily stored in form of bits. So, this provide a better option for the developer or programmers to authenticate their software, databases etc using Voice Biometrics. Num ber of methods are used to apply these Biometrics. As a first step the new user has to record his/her speech by calling a telephone collection script. Once there is an existent recording the user is allowed to invoke an en rolment form and specify personal data, such as passwords and answers to questions on various topics, as suggested by the server. The answers can be selections from predetermined value lists, e.g. selected cities or colours, or user’s own new keywords. It is also possible to add new ques tions within the existent topics or dynamically generate these based on contexts or history of previous transactions or other events.
References
. Markowit J. A., “Voice Biometrics”, Communications of the ACM, September 2000, Vol 43, no. 9.,66-73
. Speaker Authentication: Voice Biometrics over the Telephone [3]. Basha, A. Jameer, V. Palanisamy, and T. Purusothaman. “Multimodal Personal Authentication with Fingerprint, Speech and Teeth Traits using SVM Classifier.” European Journal of Scientific Research 76.3 (2012): 463-473. [4]. An Exploration of Voice Biometrics, By Lisa Myers in 2004 [5]. Li, Francis F. “Sound-Based Multimodal Person Identifi cation from Signature and Voice.” Internet Monitoring and Protection (ICIMP), 2010 Fifth International Conference on. IEEE, 2010.
. Pelecanos, Jason, JiříNavrátil, and Ganesh Ramaswamy. “Conversational biometrics: A probabilistic view.” Advanc es in Biometrics (2008): 203-224, Springer.
. González-Rodríguez, Joaquín, DoroteoToledano, and Javier Ortega-García. “Voice biometrics.” Handbook of Biomet rics (2008): 151-170, Springer.
. Furui, Sadaoki. “An overview of speaker recognition tech nology.” KLUWER INTERNATIONAL SERIES IN ENGI NEERING AND COMPUTER SCIENCE (1996): 31-56.
. Rosenberg A E Automatic speaker verification: A review. Proc. IEEE 64(4): 475–487
. Bimbot, Frédéric, et al. “A tutorial on text-independent speaker verification.” EURASIP Journal on Advances in Signal Processing 2004.4 (2004): 101962.
. F. Beritelli. Effect of background noise on the snr estimation
of biometric parameters in forensic speaker recognition. In Proceedings of the International Conference on Signal Pro cessing and Communication Systems (ICSPCS), 2008.
. Kichul Kim and Moo Young Kim. Robust speaker recog nition against background noisein an enhanced multi-con dition domain. Consumer Electronics, IEEE Transactions on,56(3):1684 –1688, aug. 2010.
. Klie, L. (2011). Voice R&D Speaks to Homeland Security. Speech Technology Magazine, 16(3), 14
. D.Miller, “Voice Biometrics Update 2011:Attacking Adja cent Markets”, Opus Research 2011.
. http://www.rsa.com/glossary/default.asp?id=1006, last ac cessed on 12.2.13
. Kim, Jae-Jung, et al. “A method of risk assessment for multi-factor authentication.” Journal of information Pro cessing Systems, JiPS7.1 (2011): 187-198.
. Smart Card Alliance (Randy Vanderhoof), “Smart Card Technology Roadmap for secure ID applications”, 2003. [18]. Speaker recognition system EP 1399915 A2, http://www. google.com/patents/EP1399915A2?cl=en.
. A.Jameer Basha, V. Palanisamy, T. Purusothaman, Multi Model
Personal Authentication with Fingerprint, Speech and Teeth Traits using SVM classifier, European Journal of Scientific Research ISSN 1450-216X Vol.76 No.3 (2012), pp.463-473.
Downloads
Published
Issue
Section
License
Copyright (c) 2022 Trinity Journal of Management, IT & Media (TJMITM)
This work is licensed under a Creative Commons Attribution 4.0 International License.