{"title":"基于语音的身份认证应用和服务中的欺诈检测","authors":"Saeid Safavi, Hock C. Gan, I. Mporas, R. Sotudeh","doi":"10.1109/ICDMW.2016.0155","DOIUrl":null,"url":null,"abstract":"Keeping track of the multiple passwords, PINs, memorable dates and other authentication details needed to gainremote access to accounts is one of modern life's less appealingchallenges. The employment of a voice-based verification as abiometric technology for both children and adults could be agood replacement to the old fashioned memory dependentprocedure. Using voice for authentication could be beneficial inseveral application areas, including, security, protection, education, call-based and web-based services. Voice-basedbiometric applications are subject to different types of spoofingattacks. The most accessible and affordable type of spoofing for avoice-based biometrics system is a replay attack. Replay, which isto playback a pre-recorded speech sample, presents a genuinerisk to automatic speaker verification technology. This workpresents two architectures for detecting frauds caused by replayattacks in a voice-based biometrics authentication systems. Experimental results confirmed that obtained performancesfrom both methods could further improve by applying a machinelearning algorithm for performing fusion at the score level. Theperformance of both methods further improved by fusion usingindependent sources of scores in different architectures.","PeriodicalId":373866,"journal":{"name":"2016 IEEE 16th International Conference on Data Mining Workshops (ICDMW)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"18","resultStr":"{\"title\":\"Fraud Detection in Voice-Based Identity Authentication Applications and Services\",\"authors\":\"Saeid Safavi, Hock C. Gan, I. Mporas, R. Sotudeh\",\"doi\":\"10.1109/ICDMW.2016.0155\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Keeping track of the multiple passwords, PINs, memorable dates and other authentication details needed to gainremote access to accounts is one of modern life's less appealingchallenges. The employment of a voice-based verification as abiometric technology for both children and adults could be agood replacement to the old fashioned memory dependentprocedure. Using voice for authentication could be beneficial inseveral application areas, including, security, protection, education, call-based and web-based services. Voice-basedbiometric applications are subject to different types of spoofingattacks. The most accessible and affordable type of spoofing for avoice-based biometrics system is a replay attack. Replay, which isto playback a pre-recorded speech sample, presents a genuinerisk to automatic speaker verification technology. This workpresents two architectures for detecting frauds caused by replayattacks in a voice-based biometrics authentication systems. Experimental results confirmed that obtained performancesfrom both methods could further improve by applying a machinelearning algorithm for performing fusion at the score level. Theperformance of both methods further improved by fusion usingindependent sources of scores in different architectures.\",\"PeriodicalId\":373866,\"journal\":{\"name\":\"2016 IEEE 16th International Conference on Data Mining Workshops (ICDMW)\",\"volume\":\"7 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"18\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 IEEE 16th International Conference on Data Mining Workshops (ICDMW)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICDMW.2016.0155\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE 16th International Conference on Data Mining Workshops (ICDMW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICDMW.2016.0155","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Fraud Detection in Voice-Based Identity Authentication Applications and Services
Keeping track of the multiple passwords, PINs, memorable dates and other authentication details needed to gainremote access to accounts is one of modern life's less appealingchallenges. The employment of a voice-based verification as abiometric technology for both children and adults could be agood replacement to the old fashioned memory dependentprocedure. Using voice for authentication could be beneficial inseveral application areas, including, security, protection, education, call-based and web-based services. Voice-basedbiometric applications are subject to different types of spoofingattacks. The most accessible and affordable type of spoofing for avoice-based biometrics system is a replay attack. Replay, which isto playback a pre-recorded speech sample, presents a genuinerisk to automatic speaker verification technology. This workpresents two architectures for detecting frauds caused by replayattacks in a voice-based biometrics authentication systems. Experimental results confirmed that obtained performancesfrom both methods could further improve by applying a machinelearning algorithm for performing fusion at the score level. Theperformance of both methods further improved by fusion usingindependent sources of scores in different architectures.