voice authentication lavanya1

Upload: itdepgpcet7225

Post on 30-May-2018

222 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/9/2019 Voice Authentication Lavanya1

    1/19

    SEMINOR TITLE: Voice Authentication

    Seminar by:

    A.V.Lavanya

    (2007-2011)

  • 8/9/2019 Voice Authentication Lavanya1

    2/19

    VOICE AUTHENTICATION

    A user- dependant pattern matchingsystem which uses a persons voice

    print to uniquely identify individuals

    using Biometric Speaker Verification

    Technology.

    SEMINOR TITLE: Voice Authentication

  • 8/9/2019 Voice Authentication Lavanya1

    3/19

    INTRODUCTION:

    uses voice prints and pattern recognition software to

    verify a speaker

    relies on the fact that vocal characteristics are

    unique for each individual

    more reliable than passwords

  • 8/9/2019 Voice Authentication Lavanya1

    4/19

    INTRODUCTION:

    uses voice prints and pattern recognition software to

    verify a speaker

    relies on the fact that vocal characteristics are

    unique for each individual

    more reliable than passwords

  • 8/9/2019 Voice Authentication Lavanya1

    5/19

    Need for Authentication:

    Identify theft and fraud

    Caller authentication

    Voice Authentication

    To protect confidential client information and

    fighting identity theft.

    To reduce cost of help desks and customer

    contact centers.

  • 8/9/2019 Voice Authentication Lavanya1

    6/19

    Speaking is natural and effortless. But your

    voice is something that is unique to you. No two

    voices are exactly the same. Voice differs from

    other forms of biometric verification such asfingerprints or iris scans. It requires no special

    equipment. It works over any phone, anywhere,

    including the internet.

    Why Voice ?

  • 8/9/2019 Voice Authentication Lavanya1

    7/19

    Captures a person's voicethe physical

    characteristics of the vocal tract and its

    harmonic and resonant frequenciesandcompares it to a stored voice print created

    during an enrollment process.

    Working of Speech Analysis System:

  • 8/9/2019 Voice Authentication Lavanya1

    8/19

  • 8/9/2019 Voice Authentication Lavanya1

    9/19

    Step1: User Enrollment

    1.Customer enters his account or ID no., and then the

    system prompts him to speak a pass phrase (typically

    either a chore password or a series of digits) three times.

    2.The speech analysis system applies a mathematical

    algorithm to the input to create a unique voice print.

    Having the user repeat the pass phrase enables the

    system to account for variances.

    3.The voice print is stored in a speaker register database.

  • 8/9/2019 Voice Authentication Lavanya1

    10/19

    Step2: User Authentication

    1. User enters or speaks his account ID and speaks thepass phrase.

    2. The voice authentication system stores the input and

    compares it to the voice print in the speaker registry

    database.

    3.If the voice matches, he/she is granted access, otherwisehe/she is rejected.

  • 8/9/2019 Voice Authentication Lavanya1

    11/19

  • 8/9/2019 Voice Authentication Lavanya1

    12/19

    Back End consists of:

    *Waveform warping module

    *A pattern-recognition module

    The back-end functions as a memory and storage

    database, as well as a decision unit that implements an

    algorithm to pattern match the template waveform

    (speakers voice) to that of the input waveform.

  • 8/9/2019 Voice Authentication Lavanya1

    13/19

    Web Authentication:

    Security internet and other remote access serviceshas never been more difficult or important.

    Passwords can be easily stolen and provide only a

    low level of security. Digital certificates only verify

    the actual computer accessing your service, notnecessarily the person at the keyboard. Webauthentication delivers the ultra high level of

    website access security and identifies protection

    required to protect confidential information andtransactions.

  • 8/9/2019 Voice Authentication Lavanya1

    14/19

    The user accesses the website login page. The website automatically generates a unique session code

    which is displayed on the user screen, together with a phone

    number.

    The user calls the voice system and is asked to speak their ID

    and session code. The users identity is voice verified. Voice verification system sends the session code and verified

    user ID to the website server. The website server generates a

    use once pass code which is sent back to Voice verification

    system.

    Voice verification systems text to speech engine converts thepass code into words spoken back to the user.

    The user enters the use once pass code into the website login

    page to complete the process.

    Working:

  • 8/9/2019 Voice Authentication Lavanya1

    15/19

  • 8/9/2019 Voice Authentication Lavanya1

    16/19

  • 8/9/2019 Voice Authentication Lavanya1

    17/19

    Voice Concerns

    In real world this system has to deal

    with behavior and environmental factors such as

    background noises or changes in user voices.

  • 8/9/2019 Voice Authentication Lavanya1

    18/19

    SEMINOR TITLE: Bio-Metrics DATE:5-2-2010

    SEMINOR TITLE: Voice Authentication

    QUERIES?

  • 8/9/2019 Voice Authentication Lavanya1

    19/19