{"id":674,"date":"2022-05-04T10:42:49","date_gmt":"2022-05-04T10:42:49","guid":{"rendered":"https:\/\/alliance.edu.in\/blog\/?p=674"},"modified":"2023-12-19T21:54:10","modified_gmt":"2023-12-19T16:24:10","slug":"voice-biometrics-for-secure-authentication","status":"publish","type":"post","link":"https:\/\/web.pinklemonadedigital.com\/alliance_blog\/voice-biometrics-for-secure-authentication\/","title":{"rendered":"Voice Biometrics for Secure Authentication"},"content":{"rendered":"<p><strong>What is voice biometric authentication?<\/strong><\/p>\n<p>Biometrics recognition is the technology of identifying a human being by using their physical and\/or behavioural characteristics. Security is the highest priority in today\u2019s digital world and biometric authentication is one of the fastest-growing technologies in the field of secure authentication. In today&#8217;s contactless access control of applications, voice and speech recognition-based authentication are the most useful biometric systems. For example, rise in the ATM skimming, card data theft issues, online data tampering, and other intrusions are the most common incidents in today\u2019s digital world.\u00a0 Biometric authentication can increase the authenticity of the system in those application areas. This step is towards the secure and convenient user authentication of the smartphone, biometric feature-based security in smartphones, financial transactions, and many other payment applications. Figure 1 presents the architecture of the biometric system.<\/p>\n<p>Voice is the most secure and highly accepted biometric recognition method among all the biometrics because of its ease of use, user acceptance, ease of implementation, and cost.<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full wp-image-676\" src=\"https:\/\/alliance.edu.in\/blog\/wp-content\/uploads\/2022\/05\/voice-biometrics-04-05-2022-02.jpg\" alt=\"Voice Biometrics for Secure Authentication\" width=\"1150\" height=\"531\" srcset=\"https:\/\/web.pinklemonadedigital.com\/alliance_blog\/wp-content\/uploads\/2022\/05\/voice-biometrics-04-05-2022-02.jpg 1150w, https:\/\/web.pinklemonadedigital.com\/alliance_blog\/wp-content\/uploads\/2022\/05\/voice-biometrics-04-05-2022-02-300x139.jpg 300w, https:\/\/web.pinklemonadedigital.com\/alliance_blog\/wp-content\/uploads\/2022\/05\/voice-biometrics-04-05-2022-02-1024x473.jpg 1024w, https:\/\/web.pinklemonadedigital.com\/alliance_blog\/wp-content\/uploads\/2022\/05\/voice-biometrics-04-05-2022-02-768x355.jpg 768w\" sizes=\"(max-width: 1150px) 100vw, 1150px\" \/><\/p>\n<p><strong>Different types of voice-based authentication:<\/strong><\/p>\n<p>The conversion of spoken word into text is called speech recognition i.e. \u201cwhat is being said\u201d and based on his\/her speech, the job of recognizing the speaker is called speaker recognition.<\/p>\n<p>There are two sub-field in speaker recognition: one is speaker verification, and another is speaker identification. Identifying the unlabelled speech of claimed speakers from the group of reference speakers is known as speaker identification i.e. who is speaking. Accepting and rejecting the claimed person is known as speaker verification. It is a decision problem with two options. There are two methods in both speaker identification and verification: fixed phrase\/input, called text-dependent, and different phrase\/input in training and testing, called text-independent.<\/p>\n<p><strong>Speaker verification for voice biometric-based authentication:<\/strong><\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-677\" src=\"https:\/\/alliance.edu.in\/blog\/wp-content\/uploads\/2022\/05\/voice-biometrics-04-05-2022-03.jpg\" alt=\"Speaker verification for voice biometric-based authentication\" width=\"811\" height=\"531\" srcset=\"https:\/\/web.pinklemonadedigital.com\/alliance_blog\/wp-content\/uploads\/2022\/05\/voice-biometrics-04-05-2022-03.jpg 811w, https:\/\/web.pinklemonadedigital.com\/alliance_blog\/wp-content\/uploads\/2022\/05\/voice-biometrics-04-05-2022-03-300x196.jpg 300w, https:\/\/web.pinklemonadedigital.com\/alliance_blog\/wp-content\/uploads\/2022\/05\/voice-biometrics-04-05-2022-03-768x503.jpg 768w\" sizes=\"(max-width: 811px) 100vw, 811px\" \/><\/p>\n<p>Figure 2 shows the different steps of speaker verification. Text independent speaker verification is more convenient than text-dependent since the user can communicate freely with the system. To obtain good performance, however, it takes more time to train and test utterances. Text-dependent speaker verification provides a better success rate for comparatively short text\/speech. It is used to uniquely identify individuals by their physiological characteristics or personal behavioural traits. To recognize a speaker, the work of speaker recognition entails extracting a unique speaker-specific feature from the voice signal.<\/p>\n<p><strong>Hypothetical description of speaker verification:<\/strong><\/p>\n<p>The theoretical review of speaker verification is explained here.<\/p>\n<p>Considering the test speech sentence is Y and system has N number of speaker. S is claimed\u00a0to\u00a0be\u00a0the\u00a0speaker.<\/p>\n<p>The\u00a0goal\u00a0of\u00a0speaker\u00a0verification\u00a0is\u00a0to\u00a0identify\u00a0whether\u00a0Y\u00a0was\u00a0said\u00a0by\u00a0S.<\/p>\n<p>Because\u00a0Y\u00a0is\u00a0assumed\u00a0to\u00a0be\u00a0a\u00a0single\u00a0speaker&#8217;s\u00a0voice\u00a0sample,\u00a0the\u00a0task\u00a0is\u00a0to verify single\u00a0speaker.<\/p>\n<p style=\"text-align: left;\">It\u00a0can\u00a0be\u00a0described\u00a0as\u00a0a\u00a0fundamental\u00a0hypothesis\u00a0that\u00a0alternates\u00a0between\u00a0the\u00a0null\u00a0(H<sub>0<\/sub>)\u00a0and\u00a0alternative\u00a0(H<sub>1<\/sub>)\u00a0hypotheses.<\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-678\" src=\"https:\/\/alliance.edu.in\/blog\/wp-content\/uploads\/2022\/05\/voice-biometrics-04-05-2022-04.jpg\" alt=\"hypotheses\" width=\"478\" height=\"225\" srcset=\"https:\/\/web.pinklemonadedigital.com\/alliance_blog\/wp-content\/uploads\/2022\/05\/voice-biometrics-04-05-2022-04.jpg 478w, https:\/\/web.pinklemonadedigital.com\/alliance_blog\/wp-content\/uploads\/2022\/05\/voice-biometrics-04-05-2022-04-300x141.jpg 300w\" sizes=\"(max-width: 478px) 100vw, 478px\" \/><\/p>\n<p><strong>Application of speaker verification system: <\/strong><\/p>\n<p>Speaker verification can be used for authentication of any system, especially for remote access of the system, smartphone, many other payment gateways, etc. Therefore, text-dependent based speaker verification can be an important biometric authentication system to enhance the security of any application.<\/p>\n<ul>\n<li>Biometric Login: Now biometric login system is widely used, thus, a voice-based biometric system can be used for person authentication, protecting the data, and for other applications also.<\/li>\n<li>It can be used in much another payment gateway like PhonePay, Google pays, etc. in the smartphone.<\/li>\n<li>In social media applications, it can also be used on smartphones and android phones.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>Dr. Saswati Debnath<\/strong><br \/>\nAssistant Professor<br \/>\nCSE Dept.<br \/>\nAlliance College of Engineering and Design<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is voice biometric authentication? Biometrics recognition is the technology of identifying a human being by using their physical and\/or behavioural characteristics. Security is the highest priority in today\u2019s digital world and biometric authentication is one of the fastest-growing technologies in the field of secure authentication. In today&#8217;s contactless access control of applications, voice and &#8230; <a title=\"Voice Biometrics for Secure Authentication\" class=\"read-more\" href=\"https:\/\/web.pinklemonadedigital.com\/alliance_blog\/voice-biometrics-for-secure-authentication\/\" aria-label=\"Read more about Voice Biometrics for Secure Authentication\">Read more<\/a><\/p>\n","protected":false},"author":6,"featured_media":675,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[113],"tags":[],"class_list":["post-674","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-alliance-college-of-engineering-and-design"],"_links":{"self":[{"href":"https:\/\/web.pinklemonadedigital.com\/alliance_blog\/wp-json\/wp\/v2\/posts\/674","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/web.pinklemonadedigital.com\/alliance_blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/web.pinklemonadedigital.com\/alliance_blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/web.pinklemonadedigital.com\/alliance_blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/web.pinklemonadedigital.com\/alliance_blog\/wp-json\/wp\/v2\/comments?post=674"}],"version-history":[{"count":1,"href":"https:\/\/web.pinklemonadedigital.com\/alliance_blog\/wp-json\/wp\/v2\/posts\/674\/revisions"}],"predecessor-version":[{"id":3158,"href":"https:\/\/web.pinklemonadedigital.com\/alliance_blog\/wp-json\/wp\/v2\/posts\/674\/revisions\/3158"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/web.pinklemonadedigital.com\/alliance_blog\/wp-json\/wp\/v2\/media\/675"}],"wp:attachment":[{"href":"https:\/\/web.pinklemonadedigital.com\/alliance_blog\/wp-json\/wp\/v2\/media?parent=674"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/web.pinklemonadedigital.com\/alliance_blog\/wp-json\/wp\/v2\/categories?post=674"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/web.pinklemonadedigital.com\/alliance_blog\/wp-json\/wp\/v2\/tags?post=674"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}