Professional Documents
Culture Documents
ON
Presented by:
A.V.LAVANYA
(2007-2011)
IIIrd B.Tech
IT
VOICE AUTHENTICATION
ABSTRACT: Introduction:
Voice ID is a type of user
Voice Authentication is a user- authentication that uses voice prints and
dependant pattern matching system which pattern recognition software to verify a
uses a person’s voice print to uniquely speaker. An adaptation of biometrics,
identify individuals using Biometric voice ID relies on the fact that vocal
Speaker Verification Technology. The characteristics, like finger prints and the
speech is processed through a non-contact people’s irises are unique for each
method, where it is not required to see or individual. The criteria that a voice ID
touch the person to recognize him/her. This system bases decisions on are created by
method of biometric voice authentication the shape of the speaker's mouth and
is ideally suited for low memory, database throat, rather than more variable
independent applications using smart cards conditions. Because of the relative
or other physical devices such as cell permanence of the characteristics it
phones. Due to the value of biometric measures, the technology is not likely to be
security for use in fraud prevention, and fooled by an attempt to disguise a voice,
the added convenience of knowing a and is not generally affected by changes
person is who they claim to be, we believe that can make a voice sound quite different
speaker verification will be more widely to the human ear, such as a bad cold or
accepted by the consumer market before extreme emotion. By verifying an
speech recognition. individual based on her biological
The popularity of speaker characteristics, she don't have to worry
verification is swiftly growing because about stolen PINs or passwords others can
speech easy to obtain without the addition use to impersonate her. This is what makes
of dedicated hardware. Improved, robust biometric security, including voice
speech recognition algorithms and PC verification systems, more reliable than
hardware have also brought this one-time passwords. Others can't impersonate you.
futuristic idea into the present. At Voice Although you can get someone's password
Security Systems, a decade of research and or PIN relatively easily, it is next to
development has lead everyone to believe impossible to steal someone's biometric
that the explosive speech processing identity.
market is here to stay.
This paper presents the need for Voice Authentication:
this system, its working, advantages and
the areas of improvement in this swiftly Voice authentication captures a
progressing voice verification system. person's voice—the physical
characteristics of the vocal tract and its
harmonic and resonant frequencies—and
compares it to a stored voiceprint created
during an enrollment process. The · To protect confidential client
technology is generating interest for use in information and fighting identity
secure applications that involve repeatable theft.
actions and where large numbers of people · To reduce cost of help desks and
need to be authenticated. These include customer contact centres.
systems that handle remote network and · Fights fraud by digitally signing
system access, password reset, time and customer bets in gaming.
attendance records and inmate verification,
in vertical sectors such as law Why Voice????
enforcement, financial services and health Speaking is natural and effortless. But your
care. voice is something that is unique to you.
No two voices are exactly the same. Voice
Need for Voice Authentication: differs from other forms of biometric
verification such as fingerprints or iris
Identify theft and fraud: scans. It requires no special equipment. It
Over the past 10 years there has been a works over any phone, anywhere,
dramatic increase in the use of call centres including the internet. Voice verification
and the internet as channels to market. This integrates seamlessly with established IVR
has been matched by massive growth in and call centre systems improving work
identity theft and fraud. Identity theft is flow and reducing call handing costs. It's
recognised as one of the fastest growing natural to use one's voice and widely
types of fraud. A report published by the accepted, and it's the only biometric that
Federal Trade Commission (FTC) provides remote authentication.
estimated that in 2003 around 10 million
Americans discovered they were victims of
identity theft. The total cost of this fraud
was estimated at over $50billion.
Voice Concerns:
In accuracy tests in lab settings,
voice authentication systems compare well
with other biometric systems. In real world
use, however, they have to deal with
behavior and environmental factors such as
background noises or changes in user
voices.
One of the biggest challenges stems
from cross channel issues – when a person
uses a different type of phone to
authenticate than the one he used during