-
Essay / The Use of Voice in Biometric Authentication
Table of ContentsIntroductionProcessFuture ScopeConclusionVoice control has been used on a large scale to improve security because there may be certain situations that it fits perfectly. Since the majority of people around the world use English, the adversary takes advantage of this fact. In this proposal, I think that if we include exceptional phrases or words in different languages, the level of difficulty for the adversary will increase. Say no to plagiarism. Get a tailor-made essay on “Why Violent Video Games Should Not Be Banned”? Get the original essayIntroductionConsider a banking center, where a large number of people call for account-related problems. When the account holder calls, they must answer security questions. If the answers match the database, the system automatically grants the call to the caller. It is possible that any adversary has all the data and can also claim to be the real account holder. Data theft can also occur if someone physically enters the building without proper identification, which can be detrimental. The traditional sliding or swiping employee card system is not very effective because ID cards can be forged very easily. Online/Telephone Banking Process: There must be a password phrase that is generated by the system based on the languages one knows. At each call, before even asking warranty questions, the structure must ask them about this sentence. This phrase cannot be replicated with the password given to log in to the account. They can use a phrase or word that can be concatenated with a random, system-generated keyword. If someone knows Spanish, then they can say a word in Spanish and then the system will generate a random keyword that will be in another language. All customers will have three attempts to say the keyword. correct sentence. If unsuccessful, the system will automatically disconnect the call. Employee Access: All employees will have a unique employee ID. Companies have a habit of giving an old employee number to a new candidate, which can lead to a security breach. The system will give them randomly selected expressions and they cannot select their own expression. Each employee receives a different expression. Employees will have three attempts to say the sentence. If the employee fails authentication, they will need to obtain a new phrase. Employees should only have access to the floor on which they work. Advantages: Words from multiple languages installed in the system will increase the variety of sentences that can be used. The word combination can be more than two. However, the customer or employee may not prefer this scenario. This can protect against ventriloquists who can imitate people's speech. Automatically disconnecting the call after three failed attempts or preventing the employee from entering the building is also a key feature as it helps make the system more secure. Disadvantages: Some words sound similar or have the same spelling in the languages. If we take them into consideration, understanding the attack might fail. This is why it is very important to have a list of these words. The system must ensure that such words cannot be used as a voice password phrase. Maintaining the database would pose a huge challenge as attackers discover advanced techniques to hack the stored data. They..