8/9/2019 Voice Authentication Lavanya1
1/19
SEMINOR TITLE: Voice Authentication
Seminar by:
A.V.Lavanya
(2007-2011)
8/9/2019 Voice Authentication Lavanya1
2/19
VOICE AUTHENTICATION
A user- dependant pattern matchingsystem which uses a persons voice
print to uniquely identify individuals
using Biometric Speaker Verification
Technology.
SEMINOR TITLE: Voice Authentication
8/9/2019 Voice Authentication Lavanya1
3/19
INTRODUCTION:
uses voice prints and pattern recognition software to
verify a speaker
relies on the fact that vocal characteristics are
unique for each individual
more reliable than passwords
8/9/2019 Voice Authentication Lavanya1
4/19
INTRODUCTION:
uses voice prints and pattern recognition software to
verify a speaker
relies on the fact that vocal characteristics are
unique for each individual
more reliable than passwords
8/9/2019 Voice Authentication Lavanya1
5/19
Need for Authentication:
Identify theft and fraud
Caller authentication
Voice Authentication
To protect confidential client information and
fighting identity theft.
To reduce cost of help desks and customer
contact centers.
8/9/2019 Voice Authentication Lavanya1
6/19
Speaking is natural and effortless. But your
voice is something that is unique to you. No two
voices are exactly the same. Voice differs from
other forms of biometric verification such asfingerprints or iris scans. It requires no special
equipment. It works over any phone, anywhere,
including the internet.
Why Voice ?
8/9/2019 Voice Authentication Lavanya1
7/19
Captures a person's voicethe physical
characteristics of the vocal tract and its
harmonic and resonant frequenciesandcompares it to a stored voice print created
during an enrollment process.
Working of Speech Analysis System:
8/9/2019 Voice Authentication Lavanya1
8/19
8/9/2019 Voice Authentication Lavanya1
9/19
Step1: User Enrollment
1.Customer enters his account or ID no., and then the
system prompts him to speak a pass phrase (typically
either a chore password or a series of digits) three times.
2.The speech analysis system applies a mathematical
algorithm to the input to create a unique voice print.
Having the user repeat the pass phrase enables the
system to account for variances.
3.The voice print is stored in a speaker register database.
8/9/2019 Voice Authentication Lavanya1
10/19
Step2: User Authentication
1. User enters or speaks his account ID and speaks thepass phrase.
2. The voice authentication system stores the input and
compares it to the voice print in the speaker registry
database.
3.If the voice matches, he/she is granted access, otherwisehe/she is rejected.
8/9/2019 Voice Authentication Lavanya1
11/19
8/9/2019 Voice Authentication Lavanya1
12/19
Back End consists of:
*Waveform warping module
*A pattern-recognition module
The back-end functions as a memory and storage
database, as well as a decision unit that implements an
algorithm to pattern match the template waveform
(speakers voice) to that of the input waveform.
8/9/2019 Voice Authentication Lavanya1
13/19
Web Authentication:
Security internet and other remote access serviceshas never been more difficult or important.
Passwords can be easily stolen and provide only a
low level of security. Digital certificates only verify
the actual computer accessing your service, notnecessarily the person at the keyboard. Webauthentication delivers the ultra high level of
website access security and identifies protection
required to protect confidential information andtransactions.
8/9/2019 Voice Authentication Lavanya1
14/19
The user accesses the website login page. The website automatically generates a unique session code
which is displayed on the user screen, together with a phone
number.
The user calls the voice system and is asked to speak their ID
and session code. The users identity is voice verified. Voice verification system sends the session code and verified
user ID to the website server. The website server generates a
use once pass code which is sent back to Voice verification
system.
Voice verification systems text to speech engine converts thepass code into words spoken back to the user.
The user enters the use once pass code into the website login
page to complete the process.
Working:
8/9/2019 Voice Authentication Lavanya1
15/19
8/9/2019 Voice Authentication Lavanya1
16/19
8/9/2019 Voice Authentication Lavanya1
17/19
Voice Concerns
In real world this system has to deal
with behavior and environmental factors such as
background noises or changes in user voices.
8/9/2019 Voice Authentication Lavanya1
18/19
SEMINOR TITLE: Bio-Metrics DATE:5-2-2010
SEMINOR TITLE: Voice Authentication
QUERIES?
8/9/2019 Voice Authentication Lavanya1
19/19