Voice Biometric System - Authentication Over the Voice Command from Remote Place - A Case Study

Authors

  • Amjad Hassan Khan M K Kristu Jayanti College
  • Aithal P S College of Engineering & Technology, Srinivas University, Mangalore-575001, India.

DOI:

https://doi.org/10.12723/mjs.58.1

Keywords:

Voice Biometric, security systems, automatic identification, authorization, uniphore

Abstract

The entire globe has been focused on the security of the data system for the past decade. With every passing day, the requirement to secure virtual data becomes much more difficult. Professionals are exploring towards advanced techniques to secure the access to system infrastructure as the threat to key information such as customer data. Numerous cases are reported daily in which an unauthorized users and fraudsters gained illegal access to system and then used confidential data such as customer information and compromised them. Lakhs of rupees have indeed been lost as a result of this personification, as well as legal issues that are best avoided especially in the banking sector. For a firm, these occurrences frequently result in a decrease in market value and a loss of trust. Passwords, OTPs are no more secure.

Author Biographies

Amjad Hassan Khan M K, Kristu Jayanti College

Department of Electronics, Kristu Jayanti College, Bengaluru - 560 077, Karnataka, India.

Phd Scholar, College of Engineering and Technology, Srinivas University, Mangalore, Karnataka, India.

Aithal P S, College of Engineering & Technology, Srinivas University, Mangalore-575001, India.

College of Engineering & Technology, Srinivas University, Mangalore - 575 001, Karnataka, India.

References

Yanushkevich, S. N. (2006, July). Synthetic biometrics: a survey. In The 2006 IEEE International Joint Conference on Neural Network Proceedings (pp. 676-683). IEEE.

Sadkhan, S. B., Al-Shukur, B. K., & Mattar, A. K. (2017, March). Biometric voice authentication auto-evaluation system. In 2017 Annual Conference on New Trends in Information & Communications Technology Applications (NTICT) (pp. 174-179). IEEE.

Eng, A., & Wahsheh, L. A. (2013, April). Look into my eyes: A survey of biometric security. In 2013 10th International Conference on Information Technology: New Generations (pp. 422-427). IEEE.

Alsaadi, I. M. (2015). Physiological biometric authentication systems, advantages, disadvantages and future development: A review. International Journal of Scientific & Technology Research, 4(12), 285-289.

Nilu, S., Alka A., & Khan, R. A. (2018). Voice Biometric: A Technology for Voice Based Authentication. Advanced Science, Engineering and Medicine,Vol. 10, 2018, 1–6.

Meng, W., Wong, D. S., Furnell, S., & Zhou, J. (2014). Surveying the development of biometric user authentication on mobile phones. IEEE Communications Surveys & Tutorials, 17(3), 1268-1293.

Aithal, P. S., & Aithal, S. (2019). New Directions in Scholarly Research–Some Fearless Innovations & Predictions for 21st Century Research. International Journal of Management, Technology, and Social Sciences (IJMTS), 4(1), 1-19.

uniphore ‘overview of the uniphore company’. Retrieved September 20, 2021, from https://www.uniphore.com/company#overview

uniphore’ ‘U-Self Serve product of the uniphore company’. Retrieved September 20, 2021, from https://www.uniphore.com/solution/u-self-serve

uniphore’ ‘U-trust product of the uniphore company’. Retrieved September 20, 2021, from https://www.uniphore.com/solution/u-trust

uniphore’ ‘U-assist product of the uniphore company’. Retrieved September 20, 2021, from https://www.uniphore.com/solution/u-assist

uniphore’ ‘U-analyze product of the uniphore company’. Retrieved September 20, 2021, from https://www.uniphore.com/solution/u-analyze

Gelly, G., & Gauvain, J. L. (2017). Optimization of RNN-based speech activity detection. IEEE/ACM Transactions on Audio, Speech, and Language Processing, 26(3), 646-656.

Tiwari, S., Chourasia, J. N., & Chourasia, V. S. (2015). A review of advancements in biometric systems. International Journal of Innovative Research in Advanced Engineering, 2(1), 187-204.

Markowitz, J. A. (2000). Voice biometrics. Communications of the ACM, 43(9), 66-73.

Dr. Rajinder Singh, Shakti Kumar(2014), Comparison of Various Biometric Methods, International Journal of Emerging Technologies in Computational and Applied Sciences(IJETCAS)14(598), 256-261.

A. H Sathish, A. H Khan M K, Nagendra S. & I. A. Nasir (2021), AI based voice biometric authentication for remote proctoring. Vidyabharati International Interdisciplinary Research Journal (Special Issue-2021)SP(11), 27-31.

Versha Tomer Dr. Pushpender Sarao (2015), Comparative Analysis of Various Biometric Techniques, Protagonist International Journal of Management And Technology (PIJMT), 2(3), 1-7.

Ratha, N. K., Connell, J. H., & Bolle, R. M. (2001). Enhancing security and privacy in biometrics-based authentication systems. IBM systems Journal, 40(3), 614-634.

gminsights, ‘ U. S. Biometrics market size by product , 2013-2024’ . Retrieved September 20, 2021, from https://gminsights.wordpress.com/2017/09/11/biometrics-market/

ShitalBaghel & Thaneshwar Kumar Sahu (2018), A brief review of different biometric authentication system based on its benefits, drawbacks and ease of comfort in use, International Journal Of Engineering Sciences & Management Research, pp. 06-11. ISSN 2349-6193.

uniphore’ ‘Press Releases / 28.01.2021. Retrieved September 20, 2021, from https://www.uniphore.com/news/uniphore-establishes-a-global-ecosystem-of-innovation-collaborates-with-worldwide-innovators-on-future-of-contact-centers

uniphore’ ‘Press Releases / 28.01.2021. Retrieved September 20, 2021, from https://www.uniphore.com/news/uniphore-unveils-industry-first-technologies-to-strengthen-both-agent-and-customer-experiences-in-the-contact-center.

Additional Files

Published

2021-07-01