Biometrics: Voice Recognition

Slides:



Advertisements
Similar presentations
PRESENTED BY: FATIMA ALSALEH Credit Cards Fraud - skimmers -
Advertisements

1.7.6.G1 © Family Economics & Financial Education –March 2008 – Financial Institutions – Online Banking – Slide 1 Funded by a grant from Take Charge America,
BIOMETRIC VOTING SYSTEM
Biometrics By: Ashley Rodriguez. Biometrics An automated method of recognizing a person based on physical or behavioral traits. Consist of two main classes.
ICT at Work Banking and Finance.
Digital Wallet Alberto Almonte (CPE) Miles Curiotto (CPE) Michael Stross (EE) The new, compact, secure and efficient way to carry all your credit and debit.
Voice Biometric Overview for SfTelephony Meetup March 10, 2011 Dan Miller Opus Research.
AN OVERVIEW OF BIOMETRIC ATMs. WHY ? CONVENTIONAL ATMs -> BIOMETRIC ATMs Environmental Concerns Environmental Concerns Security Concerns Security Concerns.
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
BTC - 1 Biometrics Technology Centre (BTC) Biometrics Solution for Authentication Prof. David Zhang Director Biometrics Technology Centre (UGC/CRC) Department.
1.7.2.G1 Electronic/Online Banking & Bill Pay Take Charge of Your Finances.
By: Monika Achury and Shuchita Singh
1.7.6.G1 © Family Economics & Financial Education –March 2008 – Financial Institutions – Online Banking Funded by a grant from Take Charge America, Inc.
PALM VEIN TECHNOLOGY.
Biometrics and Authentication Shivani Kirubanandan.
VOICE BOX® VOICE RECOGNITION Using YOUR Voice to Protect YOUR Identity! By Neil Madadi, Allison Wright, Ava Embry, Jacob Howard.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Biometrics: Identity Verification in a Networked World
Your Interactive Guide to the Digital World Discovering Computers 2012.
Brendan Cooney CSC 152. What is Input? Any data or instructions entered into the memory of a computer Data- unprocessed information Instructions- steps.
Marjie Rodrigues
Security-Authentication
“KEEPING YOU TOGETHER, BUT APART” BY: KANISHA NEWMAN United Identity Bank.
Online and Mobile Banking. Online banking Online Banking  Online banking is a fairly established practice in our internet-saturated world.  Many people.
Comparison of Classification Methods for Customer Attrition Analysis Xiaohua Hu, Ph.D. Drexel University Philadelphia, PA, 19104
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
WELCOME TO THE SEMINAR ON Money Pad, The Future Wallet
OCR GCSE ICT DATA CAPTURE METHODS. LESSON OVERVIEW In this lesson you will learn about the various methods of capturing data.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Knowledge Base approach for spoken digit recognition Vijetha Periyavaram.
Speaker Recognition By Afshan Hina.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
Introduction to Biometrics Charles Tappert Seidenberg School of CSIS, Pace University.
» Jun 9, 2003 Speaker Verification Secure AND Efficient, Deployments in Finance and Banking Jonathan Moav Director of Marketing
ECE Lecture 1 Security Services.
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Helynn Boughner EDU 674 Prof. Klein.  Is any technology that can help a person do a task. It can be as high- tech, as a computer system that speaks the.
SEMINAR TOPIC ON GLOBAL WIRELESS E-VOTING
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Hand Scanning for Entering the Building  Hand scanning will keep intruders out and improve the security between the bank and their clients.  This reliable.
Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede.
Biometrics Authentication Technology
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #18 Biometrics Applications - III October 26, 2005.
Biometrics and Retina Scan Technology Lum OSMANI Alex CHERVENKOV Course: Information Security April 2008.
Commercial Data Processing Credit. Management Information CDP makes it easier for managers to control and process the information that is needed in the.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
PRESENTATION ON BIOMETRICS
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
By Diana Liwanag. Overview The problem What are biometrics? –What are the different types? Short video of a system with a fingerprinting device. Identifying.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Electronic Banking & Security Electronic Banking & Security.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
By: Brad Brosig.  Introduction  Types of Biometric Security  The Installation Process  Biometric Authentication Errors  The Necessity of Mobile Device.
Take Charge of your Finances
SECURITY FEATURES OF ATM
Take Charge of your Finances
By Neil Madadi, Allison Wright, Ava Embry, Jacob Howard
Biometrics.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Biometrics.
Biometric technology.
A SEMINAR REPORT ON BIOMETRICS
Take Charge of your Finances
BY: Michael Etse and Maverick Fermill
Presentation transcript:

Biometrics: Voice Recognition Justin Eng Coen150

Outline of Presentation Introduction to voice biometrics The history of voice recognition and its milestones How voice biometric works Benefits and problems that voice recognition encounters Current applications and the future of this technology

Introduction to Voice Biometrics -Voice biometrics is a growing technology in computer security -It uses a measurable, physical characteristic, or personal behavioral trait to verify and authenticate an individual -It uses what you are as a way to identify yourself -Compares two (2) samples of data and verifies if they match In this biometric system a device captures a sample from a user and then compare it against the data contained in its database. The system then decides how well the two match and indicates whether or not an identification or verification has been achieved

Speech Recognition vs Speaker Verification -The most important difference is that: -Speech recognition identifies what you are saying -Speaker verification verifies that you are who you say you are

Speech Recognition A speech recognition system is designed to assist the speaker in accomplishing what that person wants to do

Speaker Verification However, if an application needs to know who is speaking, then it must authenticate the person and verify that he or she is in fact that person

Combining Speech recognition and speaker verification Speech recognition and speaker verification systems are combined to create voice biometric systems

History of voice recognition -Radio Rex who was created by the Elmwood Button Company in 1922 -During the 1940’s and 1950’s the United States Department of Defense and MIT became the largest contributors to the speech recognition field -In the 1960’s and 1970’s, the technology can be attributed to the educational institutions -Today, voice recognition systems are important

Voices are Unique -Voice recognition systems must be able to distinguish between various people’s voices -Frequency and Intensity -Training our body’s nasal and oral passages, as well as our lips, teeth, tongue, and jaw muscles

How Voice Biometrics Work -Voices are nearly impossible to recreate -Digitizing a person's speech to produce a “voice print”

Capturing a Voice Sample Within these smaller segments they are “captured” in a digital form and plotted on a spectrum.

Verification Process The voiceprint is then stored as a table of numbers, where the presence of each dominant frequency in each segment is expressed as a binary number. Since all table entries are either a 1 or 0, each column can be read bottom to top as a long binary code.

Trying to Fool Voice Recognition Systems -Voice biometrics should be able to tell the differences between real and fake users -One of the concerns about voice recognition systems is the threat of recording a person’s voice -Anti-spoofing is the key! -Challenge Response Mechanism

Benefits of Voice Recognition Systems -Another layer of security for computer systems -Produces a more efficient and cost effective environment -Saves costs: Employee’s do not need ID access cards -Saves time for companies

Problems with Voice Recognition Biometrics -Human voices do not necessarily remain the same over one’s lifetime -Uses of microphones -Environmental noise -Poor phone, or cellular connections -Vocal variations: accents -Telephone devices: voice samples are converted and transferred from an analog format to a digital format for processing

Current Applications of Voice Biometrics -Security system for physical access entry into a building -Corrections industries: inmates on parole -Telephone companies use voice-enabling services -Voice verification in telephone banking: ATM machines -Voice verification in credit cards

Voice Recognition on the Rise -Voice recognition applications are slowly growing -Vocent Solutions, Inc. suggested that:  (1)  Telephones are the primary means by which consumers will conduct financial transactions and access financial account information (2)  Consumers know about the problem of identity theft  (3)  Consumers feel that PIN Numbers and passwords are not secure enough  (4)  A strong amount of concern exists when communicating confidential information over the telephone  (5)  As a result of these security concerns and fears, consumers would be willing to participate in a voice recognition system, and also feel that it could potentially reduce fraud as well as identity theft 

Statistics

More Statistics -Voice recognition is on the rise as it has slowly been improving on its accuracy rates and meeting users’ needs for applications

Conclusion The main purpose and benefit of a voice recognition system is the amount of security that it provides. Although voice recognition is mostly secure, it still has flaws. To aid its acceptance, this biometric system can be combined with more traditional security features to provide an additional layer of security. These can include using other biometrics, or security mechanisms such as RSA, PINs or a combination of several different mechanisms. Through further development, voice recognition can be one of the most successful and largest applications of biometrics in the future to come.

Questions?