Abstract

In symmetric cryptosystems, the protection of secret keys is based on the traditional user authentication and likewise the security of the cryptosystem depends on the secrecy of the secret keys. In the event of lost, theft or infection of these secrete keys; the security of the cryptosystems would be compromised hence exposing critical information. Biometrics has been commercially used to verify user’s identity. Voice biometrics has been proven to be even more effective because it cannot be stolen in some cases like face, fingerprint or even iris biometrics. The research proves that a well-designed system will prompt an authentication question and on verification user must provide both the desired answer as well as desired matching threshold or the system ignores the user features. This research proposes a software-based architecture solution for Biometric Encryption of data using Voice Recognition that employed the Dynamic Time Warping (DTW) technique to solve the problem of speech biometric duration varying with non-linear expansion and contraction. The approach then used database to store the monolithically bind cryptographic key with the equivalent biometric hardened template of the user in such manner that identity of the key will stay hidden unless there is a successful biometric authentication by intended party. The research used the MIT mobile device speaker verification corpus (MDB) and A data set in quiet environment (QDB) for training and verifying session. Finally using the Equal Error Rate (EER) the research evaluated performance or rate at which False Acceptance Rate (FAR) and a False Rejection Rate (FRR) are equal. Therefore, according to the result it offers a better substitute method of user authentication than traditional pre-shared keys for benefit of protecting secret keys.

Highlights

  • We can define biometric as the unique, measurable, biological characteristics or trait that recognize or verify the identity of a human being automatically

  • It is clear that biometric has become a commercial medium used in verifying user's identity which has become an alternative form of user authentication that is fast replacing traditional pre-shared keys or passwords

  • Using the Equal Error Rate (EER) we evaluate performance or rate at which a False Rejection Rate (FRR) and False Acceptance Rate (FAR) are equal

Read more

Summary

Biometrics

We can define biometric as the unique, measurable, biological characteristics or trait that recognize or verify the identity of a human being automatically. It is clear that biometric has become a commercial medium used in verifying user's identity which has become an alternative form of user authentication that is fast replacing traditional pre-shared keys or passwords In this context, devices need access to keys before they communicate with each other. Transaction details that are token-based for especially biometrics will be included in this report, in such a way that surprisingly includes the entire record of transaction histories for a person without their consent This will introduce the person’s ability to access the database and make changes like correcting errors, presenting an ever-growing problem. Still despite all the existing devised models with protocols of protecting information along with privacy consistently leads to less security and more costly business practices The security model currently used optimized processes where the need for privacy and the protection of personal information as well as general security can be both be served this research proposed and important step in achieving that goal through a new positive-sum model for both protecting information and providing security, based on “Biometric Encryption using Voice”

Current Trend
Problems Associated with Biometric Identification
Literature Review
Voice Biometrics
Vioce-Generated Cryptographic Keys
Approach
Speech Processing
Biometric Key Generation
Multi-Threshold Generation
Biometric Mapping to Binary String
Hardening Template
Biometric Key Retrieval
Experiments and Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call