Abstract

The widespread use of biometric systems entails increased interest from cybercriminals aimed at developing attacks to crack them. Thus, the development of biometric identification systems must be carried out taking into account protection against these attacks. The development of new methods and algorithms for identification based on the presentation of randomly generated key features from the biometric base of user standards will help to minimize the disadvantages of the above methods of biometric identification of users. We present an implementation of a security system based on voice identification as an access control key and a verification algorithm developed using MATLAB function blocks that can authenticate a person's identity by his or her voice. Our research has shown an accuracy of 90 % for this user identification system for individual voice characteristics. It has been experimentally proven that traditional MFCCs using DNN and i and x-vector classifiers can achieve good results. The paper considers and analyzes the most well-known approaches from the literature to the problem of user identification by voice: dynamic programming methods, vector quantization, mixtures of Gaussian processes, hidden Markov model. The developed software package for biometric identification of users by voice and the method of forming the user's voice standards implemented in the complex allows reducing the number of errors in identifying users of information systems by voice by an average of 1.5 times. Our proposed system better defines voice recognition in terms of accuracy, security and complexity. The application of the results obtained will improve the security of the identification process in information systems from various attacks.

Highlights

  • Nowadays, many residential areas and companies use all kinds of security systems to protect their property, for example by using a password and user ID/PIN for security

  • The results show Deep neural networks (DNNs) x-vectors leverage data augmentation through supervised learning

  • After the actual speech signal we examine the impact of variations in the DNN topology, and is extracted by the silence detection, the Hamming window we show the results on the evaluation dataset

Read more

Summary

Introduction

Many residential areas and companies use all kinds of security systems to protect their property, for example by using a password and user ID/PIN for security. All these security systems are not protected at all, because the pin code can be hacked, the ID card can be stolen and duplicated. Voice biometric systems are a set of systems based on the uniqueness of the individual biometric characteristics of a person. Their areas of application are the same. Biometric voice systems can use standard microphones used in mobile and fixed phones, headsets for per-

Objectives
Methods
Findings
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call