Voice Biometric, A New Trend to Enhance Security

Authors

  • Nupur Gupta Appstudioz Pvt. Ltd.; Noida, Uttar Pardesh

Keywords:

Voice Biometric, CERT-I, Master & VISA, million Master & VISA, MASTER card

Abstract

Security has always been a primary concern whether be it home or of fice. With the advent of information technology security over the infor mation acquired takes a prime concern. Security breaches are prevailing  from technical to business field. Information technology has inundated  the business sector and education world and every possible area one  can think of. Consider the case of CERT-I n where, Hours ahead of its  planned protest against certain incidents of internet censorship in India  , hacker collective Anonymous attacked and brought down the website  run by Computer Emergency Response Team India (CERT-I n). Amongst  the most disastrous information leakage breach was the hacking of data  for 1.5 million Master & VISA card users. VISA & MASTER card alerts  banks about the security breach at Global Payments. The alert clearly  stated that full Track 1 & Track 2 information was taken and could have  been abused for counterfeit new cards. This information had been com promised from a period of January 21,2012 to February 25,2012. Yet  it was not the company who disclosed the security breach, the security  blogger Brian Krebs in security reported the event on 30,March,2012,  This pattern is common for all security breaches as the conclusion who  are impacted are the last ones to know about it. These threats to business  need a stronger mechanism of security to counter them. Biometrics has  offered new venues to resolve these issues.Biometrics refers to the physiological or behavioural characteristics  of a person to authenticate his/her identity. This Biometrics is the most  prominent and promising technique used for authenticating a person’s  identity. Voice Biometrics, Finger printing, facial Recognition area few  biometrics that are used for security purposes. This paper majorly cover Voice Biometrics. voice biometrics uses the pitch, tone, and rhythm  of speech. Background noise, illness, age, and differences in telephones  and microphones can cause problems with voice identification and au thorization.[Paper: exploration - voice -biometrics_1436] This is mostly  used by Banks and Call Centres to authenticate there users. A telephone  or microphone is required to proved your identity. Voice Biometrics is  mostly adopted by the customers as they find it as a normal telephonic  conversation. Remotely any customer from any location can login or use  his/her ID. Each person has a unique voice and that can be easily stored in form of  bits. So, this provide a better option for the developer or programmers to  authenticate their software, databases etc using Voice Biometrics. Num ber of methods are used to apply these Biometrics. As a first step the new  user has to record his/her speech by calling a telephone collection script.  Once there is an existent recording the user is allowed to invoke an en rolment form and specify personal data, such as passwords and answers  to questions on various topics, as suggested by the server. The answers  can be selections from predetermined value lists, e.g. selected cities or  colours, or user’s own new keywords. It is also possible to add new ques tions within the existent topics or dynamically generate these based on  contexts or history of previous transactions or other events. 

References

. Markowit J. A., “Voice Biometrics”, Communications of the ACM, September 2000, Vol 43, no. 9.,66-73

. Speaker Authentication: Voice Biometrics over the Telephone [3]. Basha, A. Jameer, V. Palanisamy, and T. Purusothaman. “Multimodal Personal Authentication with Fingerprint, Speech and Teeth Traits using SVM Classifier.” European Journal of Scientific Research 76.3 (2012): 463-473. [4]. An Exploration of Voice Biometrics, By Lisa Myers in 2004 [5]. Li, Francis F. “Sound-Based Multimodal Person Identifi cation from Signature and Voice.” Internet Monitoring and Protection (ICIMP), 2010 Fifth International Conference on. IEEE, 2010.

. Pelecanos, Jason, JiříNavrátil, and Ganesh Ramaswamy. “Conversational biometrics: A probabilistic view.” Advanc es in Biometrics (2008): 203-224, Springer.

. González-Rodríguez, Joaquín, DoroteoToledano, and Javier Ortega-García. “Voice biometrics.” Handbook of Biomet rics (2008): 151-170, Springer.

. Furui, Sadaoki. “An overview of speaker recognition tech nology.” KLUWER INTERNATIONAL SERIES IN ENGI NEERING AND COMPUTER SCIENCE (1996): 31-56.

. Rosenberg A E Automatic speaker verification: A review. Proc. IEEE 64(4): 475–487

. Bimbot, Frédéric, et al. “A tutorial on text-independent speaker verification.” EURASIP Journal on Advances in Signal Processing 2004.4 (2004): 101962.

. F. Beritelli. Effect of background noise on the snr estimation

of biometric parameters in forensic speaker recognition. In Proceedings of the International Conference on Signal Pro cessing and Communication Systems (ICSPCS), 2008.

. Kichul Kim and Moo Young Kim. Robust speaker recog nition against background noisein an enhanced multi-con dition domain. Consumer Electronics, IEEE Transactions on,56(3):1684 –1688, aug. 2010.

. Klie, L. (2011). Voice R&D Speaks to Homeland Security. Speech Technology Magazine, 16(3), 14

. D.Miller, “Voice Biometrics Update 2011:Attacking Adja cent Markets”, Opus Research 2011.

. http://www.rsa.com/glossary/default.asp?id=1006, last ac cessed on 12.2.13

. Kim, Jae-Jung, et al. “A method of risk assessment for multi-factor authentication.” Journal of information Pro cessing Systems, JiPS7.1 (2011): 187-198.

. Smart Card Alliance (Randy Vanderhoof), “Smart Card Technology Roadmap for secure ID applications”, 2003. [18]. Speaker recognition system EP 1399915 A2, http://www. google.com/patents/EP1399915A2?cl=en.

. A.Jameer Basha, V. Palanisamy, T. Purusothaman, Multi Model

Personal Authentication with Fingerprint, Speech and Teeth Traits using SVM classifier, European Journal of Scientific Research ISSN 1450-216X Vol.76 No.3 (2012), pp.463-473.

Published

2015-12-20

How to Cite

Voice Biometric, A New Trend to Enhance Security. (2015). Trinity Journal of Management, IT & Media (TJMITM), 6(1), 61–67. Retrieved from https://acspublisher.com/journals/index.php/tjmitm/article/view/1296