语音生物识别:增强安全性的新趋势

Nupur Gupta
{"title":"语音生物识别:增强安全性的新趋势","authors":"Nupur Gupta","doi":"10.18701/IMSMANTHAN.V12I01.10339","DOIUrl":null,"url":null,"abstract":"Security has always been a primary concern whether be it home or office. With the advent of information technology security over the information acquired takes a prime concern. Security breaches are prevailing from technical to business field. Information technology has inundated\nthe business sector and education world and every possible area one can think of. Consider the case of CERT-I n where, Hours ahead of its planned protest against certain incidents of internet censorship in India , hacker collective Anonymous attacked and brought down the website run by Computer Emergency Response Team India (CERT-I n). Amongst the most disastrous information leakage breach was the hacking of data for 1.5 million Master and VISA\ncard users. VISA and MASTER card alerts banks about the security breach at Global Payments. The alert clearly stated that full Track 1 and Track 2 information was taken and could have been abused for counterfeit new cards. This information had been compromised from a period of January 21,2012 to February 25,2012. Yet it was not the company who disclosed the security breach, the security blogger Brian Krebs in security reported the event on\n30,March,2012, This pattern is common for all security breaches as the conclusion who are impacted are the last ones to know about it. These threats to business need a stronger mechanism of security to counter them. Biometrics has offered new venues to resolve these issues. Biometrics refers to the physiological or behavioural characteristics of a person to authenticate his/her identity. This Biometrics is the most prominent and promising technique\nused for authenticating a person’s identity. Voice Biometrics, Finger printing, facial Recognition area few biometrics that are used for security purposes. This paper majorly cover Voice Biometrics. voice biometrics uses the pitch, tone, and rhythm of speech. Background noise, illness, age, and differences in telephones and microphones can cause problems with voice identification and authorization.[Paper: exploration - voice - biometrics_1436] This is mostly\nused by Banks and Call Centres to authenticate there users. A telephone or microphone is required to proved your identity. Voice Biometrics is mostly adopted by the customers as they find it as a normal telephonic conversation. Remotely any customer from any location can login or use his/her ID. Each person has a unique voice and that can be easily stored in form of bits. So, this provide a better option for the developer or programmers to authenticate\ntheir software, databases etc using Voice Biometrics. Number of methods are used to apply these Biometrics. As a first step the new user has to record his/her speech by calling a telephone collection script. Once there is an existent recording the user is allowed to invoke an enrolment form and specify personal data, such as passwords and answers to questions on various topics, as suggested by the server. The answers can be selections from predetermined\nvalue lists, e.g. selected cities or colours, or user’s own new keywords. It is also possible to add new questions within the existent topics or dynamically generate these based on contexts or history of previous transactions or other events.","PeriodicalId":135569,"journal":{"name":"The Journal of Innovations","volume":"40 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Voice Biometric : A New Trend to Enhance Security\",\"authors\":\"Nupur Gupta\",\"doi\":\"10.18701/IMSMANTHAN.V12I01.10339\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Security has always been a primary concern whether be it home or office. With the advent of information technology security over the information acquired takes a prime concern. Security breaches are prevailing from technical to business field. Information technology has inundated\\nthe business sector and education world and every possible area one can think of. Consider the case of CERT-I n where, Hours ahead of its planned protest against certain incidents of internet censorship in India , hacker collective Anonymous attacked and brought down the website run by Computer Emergency Response Team India (CERT-I n). Amongst the most disastrous information leakage breach was the hacking of data for 1.5 million Master and VISA\\ncard users. VISA and MASTER card alerts banks about the security breach at Global Payments. The alert clearly stated that full Track 1 and Track 2 information was taken and could have been abused for counterfeit new cards. This information had been compromised from a period of January 21,2012 to February 25,2012. Yet it was not the company who disclosed the security breach, the security blogger Brian Krebs in security reported the event on\\n30,March,2012, This pattern is common for all security breaches as the conclusion who are impacted are the last ones to know about it. These threats to business need a stronger mechanism of security to counter them. Biometrics has offered new venues to resolve these issues. Biometrics refers to the physiological or behavioural characteristics of a person to authenticate his/her identity. This Biometrics is the most prominent and promising technique\\nused for authenticating a person’s identity. Voice Biometrics, Finger printing, facial Recognition area few biometrics that are used for security purposes. This paper majorly cover Voice Biometrics. voice biometrics uses the pitch, tone, and rhythm of speech. Background noise, illness, age, and differences in telephones and microphones can cause problems with voice identification and authorization.[Paper: exploration - voice - biometrics_1436] This is mostly\\nused by Banks and Call Centres to authenticate there users. A telephone or microphone is required to proved your identity. Voice Biometrics is mostly adopted by the customers as they find it as a normal telephonic conversation. Remotely any customer from any location can login or use his/her ID. Each person has a unique voice and that can be easily stored in form of bits. So, this provide a better option for the developer or programmers to authenticate\\ntheir software, databases etc using Voice Biometrics. Number of methods are used to apply these Biometrics. As a first step the new user has to record his/her speech by calling a telephone collection script. Once there is an existent recording the user is allowed to invoke an enrolment form and specify personal data, such as passwords and answers to questions on various topics, as suggested by the server. The answers can be selections from predetermined\\nvalue lists, e.g. selected cities or colours, or user’s own new keywords. It is also possible to add new questions within the existent topics or dynamically generate these based on contexts or history of previous transactions or other events.\",\"PeriodicalId\":135569,\"journal\":{\"name\":\"The Journal of Innovations\",\"volume\":\"40 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"The Journal of Innovations\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.18701/IMSMANTHAN.V12I01.10339\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"The Journal of Innovations","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.18701/IMSMANTHAN.V12I01.10339","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

无论是在家里还是在办公室,安全一直是首要考虑的问题。随着信息技术的发展,信息安全成为人们最关心的问题。从技术领域到业务领域,安全漏洞都很普遍。信息技术已经淹没了商业部门和教育世界以及人们能想到的每一个可能的领域。以CERT-I - n为例,在其计划抗议印度某些互联网审查事件的数小时前,黑客团体Anonymous攻击并摧毁了由印度计算机应急响应小组(Computer Emergency Response Team India, CERT-I - n)运营的网站,其中最严重的信息泄露事件是150万Master和VISAcard用户的数据遭到黑客攻击。VISA和MASTER卡提醒银行注意全球支付的安全漏洞。警报清楚地表明,1号轨道和2号轨道的全部信息已被获取,并可能被滥用于伪造新卡。这些信息在2012年1月21日至2012年2月25日期间被泄露。然而,并不是该公司披露了安全漏洞,安全博主Brian Krebs在2012年3月30日报道了这一事件,这种模式在所有安全漏洞中都很常见,因为结论是受影响的人是最后知道它的人。这些对企业的威胁需要一个更强大的安全机制来应对。生物识别技术为解决这些问题提供了新的途径。生物特征识别指的是通过一个人的生理或行为特征来验证他/她的身份。这种生物识别技术是用于验证个人身份的最突出和最有前途的技术。语音生物识别、指纹识别、面部识别等几种生物识别技术被用于安全目的。本文主要介绍了语音生物识别技术。语音生物识别技术利用语音的音高、语调和节奏。背景噪音、疾病、年龄以及电话和麦克风的差异都会导致声音识别和授权问题。[论文:探索-声音-生物识别]这主要被银行和呼叫中心用来验证他们的用户。需要电话或麦克风来证明你的身份。语音生物识别技术大多被客户采用,因为他们发现这是一个正常的电话交谈。远程任何客户从任何位置都可以登录或使用他/她的ID。每个人都有独特的声音,可以很容易地以比特的形式存储。因此,这为开发人员或程序员使用语音生物识别技术验证他们的软件,数据库等提供了更好的选择。许多方法被用来应用这些生物识别技术。作为第一步,新用户必须通过调用电话收集脚本来记录他/她的讲话。一旦存在记录,就允许用户调用注册表单并按照服务器的建议指定个人数据,例如密码和各种主题问题的答案。答案可以从预先确定的值列表中选择,例如选定的城市或颜色,或者用户自己的新关键字。还可以在现有主题中添加新问题,或者根据上下文或以前事务或其他事件的历史动态生成这些问题。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Voice Biometric : A New Trend to Enhance Security
Security has always been a primary concern whether be it home or office. With the advent of information technology security over the information acquired takes a prime concern. Security breaches are prevailing from technical to business field. Information technology has inundated the business sector and education world and every possible area one can think of. Consider the case of CERT-I n where, Hours ahead of its planned protest against certain incidents of internet censorship in India , hacker collective Anonymous attacked and brought down the website run by Computer Emergency Response Team India (CERT-I n). Amongst the most disastrous information leakage breach was the hacking of data for 1.5 million Master and VISA card users. VISA and MASTER card alerts banks about the security breach at Global Payments. The alert clearly stated that full Track 1 and Track 2 information was taken and could have been abused for counterfeit new cards. This information had been compromised from a period of January 21,2012 to February 25,2012. Yet it was not the company who disclosed the security breach, the security blogger Brian Krebs in security reported the event on 30,March,2012, This pattern is common for all security breaches as the conclusion who are impacted are the last ones to know about it. These threats to business need a stronger mechanism of security to counter them. Biometrics has offered new venues to resolve these issues. Biometrics refers to the physiological or behavioural characteristics of a person to authenticate his/her identity. This Biometrics is the most prominent and promising technique used for authenticating a person’s identity. Voice Biometrics, Finger printing, facial Recognition area few biometrics that are used for security purposes. This paper majorly cover Voice Biometrics. voice biometrics uses the pitch, tone, and rhythm of speech. Background noise, illness, age, and differences in telephones and microphones can cause problems with voice identification and authorization.[Paper: exploration - voice - biometrics_1436] This is mostly used by Banks and Call Centres to authenticate there users. A telephone or microphone is required to proved your identity. Voice Biometrics is mostly adopted by the customers as they find it as a normal telephonic conversation. Remotely any customer from any location can login or use his/her ID. Each person has a unique voice and that can be easily stored in form of bits. So, this provide a better option for the developer or programmers to authenticate their software, databases etc using Voice Biometrics. Number of methods are used to apply these Biometrics. As a first step the new user has to record his/her speech by calling a telephone collection script. Once there is an existent recording the user is allowed to invoke an enrolment form and specify personal data, such as passwords and answers to questions on various topics, as suggested by the server. The answers can be selections from predetermined value lists, e.g. selected cities or colours, or user’s own new keywords. It is also possible to add new questions within the existent topics or dynamically generate these based on contexts or history of previous transactions or other events.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信