Vol. 20 No. 3 (2021): Mapana Journal of Sciences
Research Articles

Voice Biometric System - Authentication Over the Voice Command from Remote Place - A Case Study

Amjad Hassan Khan M K
Kristu Jayanti College
Bio
Aithal P S
College of Engineering & Technology, Srinivas University, Mangalore-575001, India.
Bio

Published 2021-07-01

Keywords

  • Voice Biometric,
  • security systems,
  • automatic identification,
  • authorization,
  • uniphore

Abstract

The entire globe has been focused on the security of the data system for the past decade. With every passing day, the requirement to secure virtual data becomes much more difficult. Professionals are exploring towards advanced techniques to secure the access to system infrastructure as the threat to key information such as customer data. Numerous cases are reported daily in which an unauthorized users and fraudsters gained illegal access to system and then used confidential data such as customer information and compromised them. Lakhs of rupees have indeed been lost as a result of this personification, as well as legal issues that are best avoided especially in the banking sector. For a firm, these occurrences frequently result in a decrease in market value and a loss of trust. Passwords, OTPs are no more secure.

References

  1. Yanushkevich, S. N. (2006, July). Synthetic biometrics: a survey. In The 2006 IEEE International Joint Conference on Neural Network Proceedings (pp. 676-683). IEEE.
  2. Sadkhan, S. B., Al-Shukur, B. K., & Mattar, A. K. (2017, March). Biometric voice authentication auto-evaluation system. In 2017 Annual Conference on New Trends in Information & Communications Technology Applications (NTICT) (pp. 174-179). IEEE.
  3. Eng, A., & Wahsheh, L. A. (2013, April). Look into my eyes: A survey of biometric security. In 2013 10th International Conference on Information Technology: New Generations (pp. 422-427). IEEE.
  4. Alsaadi, I. M. (2015). Physiological biometric authentication systems, advantages, disadvantages and future development: A review. International Journal of Scientific & Technology Research, 4(12), 285-289.
  5. Nilu, S., Alka A., & Khan, R. A. (2018). Voice Biometric: A Technology for Voice Based Authentication. Advanced Science, Engineering and Medicine,Vol. 10, 2018, 1–6.
  6. Meng, W., Wong, D. S., Furnell, S., & Zhou, J. (2014). Surveying the development of biometric user authentication on mobile phones. IEEE Communications Surveys & Tutorials, 17(3), 1268-1293.
  7. Aithal, P. S., & Aithal, S. (2019). New Directions in Scholarly Research–Some Fearless Innovations & Predictions for 21st Century Research. International Journal of Management, Technology, and Social Sciences (IJMTS), 4(1), 1-19.
  8. uniphore ‘overview of the uniphore company’. Retrieved September 20, 2021, from https://www.uniphore.com/company#overview
  9. uniphore’ ‘U-Self Serve product of the uniphore company’. Retrieved September 20, 2021, from https://www.uniphore.com/solution/u-self-serve
  10. uniphore’ ‘U-trust product of the uniphore company’. Retrieved September 20, 2021, from https://www.uniphore.com/solution/u-trust
  11. uniphore’ ‘U-assist product of the uniphore company’. Retrieved September 20, 2021, from https://www.uniphore.com/solution/u-assist
  12. uniphore’ ‘U-analyze product of the uniphore company’. Retrieved September 20, 2021, from https://www.uniphore.com/solution/u-analyze
  13. Gelly, G., & Gauvain, J. L. (2017). Optimization of RNN-based speech activity detection. IEEE/ACM Transactions on Audio, Speech, and Language Processing, 26(3), 646-656.
  14. Tiwari, S., Chourasia, J. N., & Chourasia, V. S. (2015). A review of advancements in biometric systems. International Journal of Innovative Research in Advanced Engineering, 2(1), 187-204.
  15. Markowitz, J. A. (2000). Voice biometrics. Communications of the ACM, 43(9), 66-73.
  16. Dr. Rajinder Singh, Shakti Kumar(2014), Comparison of Various Biometric Methods, International Journal of Emerging Technologies in Computational and Applied Sciences(IJETCAS)14(598), 256-261.
  17. A. H Sathish, A. H Khan M K, Nagendra S. & I. A. Nasir (2021), AI based voice biometric authentication for remote proctoring. Vidyabharati International Interdisciplinary Research Journal (Special Issue-2021)SP(11), 27-31.
  18. Versha Tomer Dr. Pushpender Sarao (2015), Comparative Analysis of Various Biometric Techniques, Protagonist International Journal of Management And Technology (PIJMT), 2(3), 1-7.
  19. Ratha, N. K., Connell, J. H., & Bolle, R. M. (2001). Enhancing security and privacy in biometrics-based authentication systems. IBM systems Journal, 40(3), 614-634.
  20. gminsights, ‘ U. S. Biometrics market size by product , 2013-2024’ . Retrieved September 20, 2021, from https://gminsights.wordpress.com/2017/09/11/biometrics-market/
  21. ShitalBaghel & Thaneshwar Kumar Sahu (2018), A brief review of different biometric authentication system based on its benefits, drawbacks and ease of comfort in use, International Journal Of Engineering Sciences & Management Research, pp. 06-11. ISSN 2349-6193.
  22. uniphore’ ‘Press Releases / 28.01.2021. Retrieved September 20, 2021, from https://www.uniphore.com/news/uniphore-establishes-a-global-ecosystem-of-innovation-collaborates-with-worldwide-innovators-on-future-of-contact-centers
  23. uniphore’ ‘Press Releases / 28.01.2021. Retrieved September 20, 2021, from https://www.uniphore.com/news/uniphore-unveils-industry-first-technologies-to-strengthen-both-agent-and-customer-experiences-in-the-contact-center.