Enhancing Web Application Security: Advanced Biometric Voice Verification for Two-Factor Authentication

被引:3
作者
Kaminski, Kamil Adam [1 ,2 ]
Dobrowolski, Andrzej Piotr [3 ]
Piotrowski, Zbigniew [3 ]
Scibiorek, Przemyslaw [4 ]
机构
[1] Mil Univ Technol, Inst Optoelect, 2 Kaliski St, PL-00908 Warsaw, Poland
[2] BITRES Sp Zoo, 9-2 Chalubinski St, PL-02004 Warsaw, Poland
[3] Mil Univ Technol, Fac Elect, 2 Kaliski St, PL-00908 Warsaw, Poland
[4] POL Cyber Command, 2 Buka St, PL-05119 Legionowo, Poland
关键词
speaker recognition; biometrics (access control); authentication; cepstral analysis; Gaussian mixture model; genetic algorithms; system verification; RECOGNITION;
D O I
10.3390/electronics12183791
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a voice biometrics system implemented in a web application as part of a two-factor authentication (2FA) user login. The web-based application, via a client interface, runs registration, preprocessing, feature extraction and normalization, classification, and speaker verification procedures based on a modified Gaussian mixture model (GMM) algorithm adapted to the application requirements. The article describes in detail the internal modules of this ASR (Automatic Speaker Recognition) system. A comparison of the performance of competing ASR systems using the commercial NIST 2002 SRE voice dataset tested under the same conditions is also presented. In addition, it presents the results of the influence of the application of cepstral mean and variance normalization over a sliding window (WCMVN) and its relevance, especially for voice recordings recorded in varying acoustic tracks. The article also presents the results of the selection of a reference model representing an alternative hypothesis in the decision-making system, which significantly translates into an increase in the effectiveness of speaker verification. The final experiment presented is a test of the performance achieved in a varying acoustic environment during remote voice login to a web portal by the test group, as well as a final adjustment of the decision-making threshold.
引用
收藏
页数:19
相关论文
共 53 条
  • [1] Social Authentication Applications, Attacks, Defense Strategies and Future Research Directions: A Systematic Review
    Alomar, Noura
    Alsaleh, Mansour
    Alarifi, Abdulrahman
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2017, 19 (02): : 1080 - 1111
  • [2] Bezzateev S., 2020, WECONF C P, DOI [10.1109/WECONF48837.2020.9131537, DOI 10.1109/WECONF48837.2020.9131537]
  • [3] Model selection and score normalization for text-dependent single utterance speaker verification
    Buyuk, Osman
    Arslan, Mustafa Levent
    [J]. TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2012, 20 : 1277 - 1295
  • [4] Improvement of the learning process of the automated speaker recognition system for critical use with HMM-DNN component
    Bykov, Mykola M.
    Kovtun, Viacheslav V.
    Kobylyanska, Iryna M.
    Wojcik, Waldemar
    Smailova, Saule
    [J]. PHOTONICS APPLICATIONS IN ASTRONOMY, COMMUNICATIONS, INDUSTRY, AND HIGH-ENERGY PHYSICS EXPERIMENTS 2019, 2019, 11176
  • [5] Ciota Z., 2010, METODY PRZETWARZANIE
  • [6] COMPARISON OF PARAMETRIC REPRESENTATIONS FOR MONOSYLLABIC WORD RECOGNITION IN CONTINUOUSLY SPOKEN SENTENCES
    DAVIS, SB
    MERMELSTEIN, P
    [J]. IEEE TRANSACTIONS ON ACOUSTICS SPEECH AND SIGNAL PROCESSING, 1980, 28 (04): : 357 - 366
  • [7] Automatic speaker recognition from speech signal using bidirectional long-short-term memory recurrent neural network
    Devi, Kharibam Jilenkumari
    Thongam, Khelchandra
    [J]. COMPUTATIONAL INTELLIGENCE, 2023, 39 (02) : 170 - 193
  • [8] Dobrowolski AP, 2012, PRZ ELEKTROTECHNICZN, V88, P12
  • [9] Dustor A, 2020, SIG P ALGO ARCH ARR, P174
  • [10] Fujii H, 2013, INT CONF INTERNET, P283, DOI 10.1109/ICIST.2013.6747556