SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Biometrics: Voice
Recognition

Justin Eng
Coen150
Outline of Presentation
Introduction to voice biometrics
The history of voice recognition and its
milestones
How voice biometric works
Benefits and problems that voice
recognition encounters
Current applications and the future of
this technology
Introduction to Voice
Biometrics
-Voice biometrics is a growing technology in
computer security
-It uses a measurable, physical characteristic, or
personal behavioral trait to verify and authenticate
an individual
-It uses what you are as a way to identify yourself
-Compares two (2) samples of data and verifies
if they match
Speech Recognition
vs
Speaker Verification
-The most important
difference is that:
-Speech recognition
identifies what you are
saying
-Speaker verification
verifies that you are who
you say you are
Speech Recognition
A speech recognition
system is designed to
assist the speaker in
accomplishing what that
person wants to do
Speaker Verification
However, if an
application needs to
know who is
speaking, then it must
authenticate the
person and verify that
he or she is in fact that
person
Combining Speech
recognition and speaker
verification
Speech recognition
and speaker
verification systems
are combined to
create voice
biometric systems
History of voice
recognition

-Radio Rex who was created by the
Elmwood Button Company in 1922

-During the 1940’s and 1950’s the
United States Department of Defense
and MIT became the largest
contributors to the speech recognition
field
-In the 1960’s and 1970’s, the
technology can be attributed to the
educational institutions
-Today, voice recognition systems are
important
Voices are Unique
-Voice recognition systems must be able to
distinguish between various people’s voices
-Frequency and Intensity
-Training our body’s nasal and oral passages, as
well as our lips, teeth, tongue, and jaw muscles
How Voice Biometrics
Work
-Voices are nearly
impossible to
recreate
-Digitizing a
person's speech to
produce a “voice
print”
Capturing a Voice
Sample
Within these smaller
segments they are
“captured” in a digital
form and plotted on a
spectrum.
Verification Process
The voiceprint is then
stored as a table of
numbers, where the
presence of each
dominant frequency in
each segment is
expressed as a binary
number. Since all table
entries are either a 1 or
0, each column can be
read bottom to top as a
long binary code.
Trying to Fool Voice
Recognition Systems
-Voice biometrics should be able to tell the differences
between real and fake users
-One of the concerns about voice recognition systems is
the threat of recording a person’s voice
-Anti-spoofing is the key!
-Challenge Response Mechanism
Benefits of Voice
Recognition Systems
-Another layer of security
for computer systems
-Produces a more efficient
and cost effective
environment
-Saves costs: Employee’s
do not need ID access cards
-Saves time for companies
Problems with Voice
Recognition
Biometrics over one’s
-Human voices do not necessarily remain the same
lifetime
-Uses of microphones
-Environmental noise
-Poor phone, or cellular connections
-Vocal variations: accents
-Telephone devices: voice samples are converted and transferred
from an analog format to a digital format for processing
Current Applications
of Voice Biometrics

-Security system for physical access entry
into a building
-Corrections industries: inmates on parole

-Telephone companies use voice-enabling
services
-Voice verification in telephone banking:
ATM machines
-Voice verification in credit cards
Voice Recognition on
the Rise
-Voice recognition applications are slowly growing
-Vocent Solutions, Inc. suggested that:
(1) Telephones are the primary means by which consumers will
conduct financial transactions and access financial account information
(2) Consumers know about the problem of identity theft
(3) Consumers feel that PIN Numbers and passwords are not secure
enough
(4) A strong amount of concern exists when communicating
confidential information over the telephone
(5) As a result of these security concerns and fears, consumers would
be willing to participate in a voice recognition system, and also feel that
it could potentially reduce fraud as well as identity theft
Statistics
More Statistics
-Voice recognition is
on the rise as it has
slowly been
improving on its
accuracy rates and
meeting users’ needs
for applications
Conclusion
The main purpose and benefit of a voice recognition system
is the amount of security that it provides. Although voice
recognition is mostly secure, it still has flaws. To aid its
acceptance, this biometric system can be combined with
more traditional security features to provide an additional
layer of security. These can include using other biometrics,
or security mechanisms such as RSA, PINs or a combination
of several different mechanisms. Through further
development, voice recognition can be one of the most
successful and largest applications of biometrics in the future
to come.
Questions?

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Automatic Speech Recognition
Automatic Speech RecognitionAutomatic Speech Recognition
Automatic Speech Recognition
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and Security
 
Voice recognition system
Voice recognition systemVoice recognition system
Voice recognition system
 
Speaker identification
Speaker identificationSpeaker identification
Speaker identification
 
Voice Recognition
Voice RecognitionVoice Recognition
Voice Recognition
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric system
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentation
 
Pattern recognition Hand Geometry
Pattern recognition Hand GeometryPattern recognition Hand Geometry
Pattern recognition Hand Geometry
 
voice recognition
voice recognition voice recognition
voice recognition
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
 
Voice recognition
Voice recognitionVoice recognition
Voice recognition
 
Pattern recognition voice biometrics
Pattern recognition voice biometricsPattern recognition voice biometrics
Pattern recognition voice biometrics
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
Speech Recognition
Speech RecognitionSpeech Recognition
Speech Recognition
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 

Andere mochten auch

Voice Recognition Car
Voice Recognition CarVoice Recognition Car
Voice Recognition Carrchovatiya
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final pptAnkita Vanage
 
Voice controlled spy robot for security system
Voice controlled spy robot for security systemVoice controlled spy robot for security system
Voice controlled spy robot for security systemMayank Prajapati
 
Online signature recognition
Online signature recognitionOnline signature recognition
Online signature recognitionPiyush Mittal
 
VOICE BASED SECURITY SYSTEM
VOICE BASED SECURITY SYSTEMVOICE BASED SECURITY SYSTEM
VOICE BASED SECURITY SYSTEMNikhil Ravi
 
「大數據」時代的「小問題」-- 以數據分析的手法處理虛擬歌手聲源參數
「大數據」時代的「小問題」-- 以數據分析的手法處理虛擬歌手聲源參數「大數據」時代的「小問題」-- 以數據分析的手法處理虛擬歌手聲源參數
「大數據」時代的「小問題」-- 以數據分析的手法處理虛擬歌手聲源參數Yuan CHAO
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyAgrani Rastogi
 
Face Recognition
Face RecognitionFace Recognition
Face Recognitionlaknatha
 
(Deep) Neural Networks在 NLP 和 Text Mining 总结
(Deep) Neural Networks在 NLP 和 Text Mining 总结(Deep) Neural Networks在 NLP 和 Text Mining 总结
(Deep) Neural Networks在 NLP 和 Text Mining 总结君 廖
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYJASHU JASWANTH
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPTSiddharth Modi
 
human computer interface
human computer interfacehuman computer interface
human computer interfaceSantosh Kumar
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition pptSantosh Kumar
 
Voice recognition security systems
Voice recognition security systemsVoice recognition security systems
Voice recognition security systemsSandeep Kumar
 

Andere mochten auch (20)

Voice Recognition Car
Voice Recognition CarVoice Recognition Car
Voice Recognition Car
 
Voice controlled Robot
Voice controlled RobotVoice controlled Robot
Voice controlled Robot
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Voice controlled spy robot for security system
Voice controlled spy robot for security systemVoice controlled spy robot for security system
Voice controlled spy robot for security system
 
biometrics
biometricsbiometrics
biometrics
 
Online signature recognition
Online signature recognitionOnline signature recognition
Online signature recognition
 
Signature recognition
Signature recognitionSignature recognition
Signature recognition
 
VOICE BASED SECURITY SYSTEM
VOICE BASED SECURITY SYSTEMVOICE BASED SECURITY SYSTEM
VOICE BASED SECURITY SYSTEM
 
Voice Recognition
Voice RecognitionVoice Recognition
Voice Recognition
 
「大數據」時代的「小問題」-- 以數據分析的手法處理虛擬歌手聲源參數
「大數據」時代的「小問題」-- 以數據分析的手法處理虛擬歌手聲源參數「大數據」時代的「小問題」-- 以數據分析的手法處理虛擬歌手聲源參數
「大數據」時代的「小問題」-- 以數據分析的手法處理虛擬歌手聲源參數
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
biometrics
biometricsbiometrics
biometrics
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
(Deep) Neural Networks在 NLP 和 Text Mining 总结
(Deep) Neural Networks在 NLP 和 Text Mining 总结(Deep) Neural Networks在 NLP 和 Text Mining 总结
(Deep) Neural Networks在 NLP 和 Text Mining 总结
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
human computer interface
human computer interfacehuman computer interface
human computer interface
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
Voice recognition security systems
Voice recognition security systemsVoice recognition security systems
Voice recognition security systems
 

Ähnlich wie Voice recognition

Speaker recognition in android
Speaker recognition in androidSpeaker recognition in android
Speaker recognition in androidAnshuli Mittal
 
Speaker recognition in android
Speaker recognition in androidSpeaker recognition in android
Speaker recognition in androidAnshuli Mittal
 
Story Voice authentication systems .pdf
Story Voice authentication systems .pdfStory Voice authentication systems .pdf
Story Voice authentication systems .pdfBhusan Chettri
 
Authentication System Based on the Combination of Voice Biometrics and OTP Ge...
Authentication System Based on the Combination of Voice Biometrics and OTP Ge...Authentication System Based on the Combination of Voice Biometrics and OTP Ge...
Authentication System Based on the Combination of Voice Biometrics and OTP Ge...ijtsrd
 
Voice biometric authentication
Voice biometric authenticationVoice biometric authentication
Voice biometric authenticationSensiple Inc.,
 
Voice Biometrics – The way forward in remote user authentication
Voice Biometrics – The way forward in remote user authenticationVoice Biometrics – The way forward in remote user authentication
Voice Biometrics – The way forward in remote user authenticationUniphore
 
Speaker Recognition System
Speaker  Recognition SystemSpeaker  Recognition System
Speaker Recognition SystemKiran Conquer
 
How to build a voice biometric system.pdf
How to build a voice biometric system.pdfHow to build a voice biometric system.pdf
How to build a voice biometric system.pdfBahaa Abdulhadi
 
Voice Recognition information hiding.ppt
Voice Recognition information hiding.pptVoice Recognition information hiding.ppt
Voice Recognition information hiding.pptnaghamallella
 
VOICE BASED SECURITY SYSTEM
VOICE BASED SECURITY SYSTEMVOICE BASED SECURITY SYSTEM
VOICE BASED SECURITY SYSTEMNikhil Ravi
 
The Case for Voice + Face Recognition
The Case for Voice + Face RecognitionThe Case for Voice + Face Recognition
The Case for Voice + Face Recognitionderektop
 
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICES
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICESVOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICES
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICESijsptm
 
Voice-based Login System
Voice-based Login SystemVoice-based Login System
Voice-based Login SystemIRJET Journal
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)JIEMS Akkalkuwa
 
Recognizing  the fact usernames passwords are the weakest link in an.docx
Recognizing  the fact usernames passwords are the weakest link in an.docxRecognizing  the fact usernames passwords are the weakest link in an.docx
Recognizing  the fact usernames passwords are the weakest link in an.docxdanas19
 
The Benefits and Drawbacks of Using Voice.pdf
The Benefits and Drawbacks of Using Voice.pdfThe Benefits and Drawbacks of Using Voice.pdf
The Benefits and Drawbacks of Using Voice.pdfCIOWomenMagazine
 
Bio metrics in secure e transaction
Bio metrics in secure e transactionBio metrics in secure e transaction
Bio metrics in secure e transactionIJARIIT
 

Ähnlich wie Voice recognition (20)

Speaker recognition in android
Speaker recognition in androidSpeaker recognition in android
Speaker recognition in android
 
Speaker recognition in android
Speaker recognition in androidSpeaker recognition in android
Speaker recognition in android
 
Story Voice authentication systems .pdf
Story Voice authentication systems .pdfStory Voice authentication systems .pdf
Story Voice authentication systems .pdf
 
Authentication System Based on the Combination of Voice Biometrics and OTP Ge...
Authentication System Based on the Combination of Voice Biometrics and OTP Ge...Authentication System Based on the Combination of Voice Biometrics and OTP Ge...
Authentication System Based on the Combination of Voice Biometrics and OTP Ge...
 
Voice biometric authentication
Voice biometric authenticationVoice biometric authentication
Voice biometric authentication
 
Voice Biometrics – The way forward in remote user authentication
Voice Biometrics – The way forward in remote user authenticationVoice Biometrics – The way forward in remote user authentication
Voice Biometrics – The way forward in remote user authentication
 
Speaker Recognition System
Speaker  Recognition SystemSpeaker  Recognition System
Speaker Recognition System
 
How to build a voice biometric system.pdf
How to build a voice biometric system.pdfHow to build a voice biometric system.pdf
How to build a voice biometric system.pdf
 
Voice Recognition information hiding.ppt
Voice Recognition information hiding.pptVoice Recognition information hiding.ppt
Voice Recognition information hiding.ppt
 
Bio Metrics
Bio MetricsBio Metrics
Bio Metrics
 
VOICE BASED SECURITY SYSTEM
VOICE BASED SECURITY SYSTEMVOICE BASED SECURITY SYSTEM
VOICE BASED SECURITY SYSTEM
 
The Case for Voice + Face Recognition
The Case for Voice + Face RecognitionThe Case for Voice + Face Recognition
The Case for Voice + Face Recognition
 
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICES
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICESVOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICES
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICES
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
Voice-based Login System
Voice-based Login SystemVoice-based Login System
Voice-based Login System
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
 
Recognizing  the fact usernames passwords are the weakest link in an.docx
Recognizing  the fact usernames passwords are the weakest link in an.docxRecognizing  the fact usernames passwords are the weakest link in an.docx
Recognizing  the fact usernames passwords are the weakest link in an.docx
 
The Benefits and Drawbacks of Using Voice.pdf
The Benefits and Drawbacks of Using Voice.pdfThe Benefits and Drawbacks of Using Voice.pdf
The Benefits and Drawbacks of Using Voice.pdf
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
 
Bio metrics in secure e transaction
Bio metrics in secure e transactionBio metrics in secure e transaction
Bio metrics in secure e transaction
 

Mehr von Kenneth Carnesi, JD

Mehr von Kenneth Carnesi, JD (7)

Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01
 
Linkedinpotionoct13 131031130548-phpapp01
Linkedinpotionoct13 131031130548-phpapp01Linkedinpotionoct13 131031130548-phpapp01
Linkedinpotionoct13 131031130548-phpapp01
 
Thegivingtree 110602182730-phpapp01
Thegivingtree 110602182730-phpapp01Thegivingtree 110602182730-phpapp01
Thegivingtree 110602182730-phpapp01
 
Monkeetech let me know
Monkeetech let me knowMonkeetech let me know
Monkeetech let me know
 
Monkeetech security swipe 1.3
Monkeetech security swipe 1.3Monkeetech security swipe 1.3
Monkeetech security swipe 1.3
 
Payfone (1)
Payfone (1)Payfone (1)
Payfone (1)
 
Hoyos deck
Hoyos deckHoyos deck
Hoyos deck
 

Kürzlich hochgeladen

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Kürzlich hochgeladen (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Voice recognition

  • 2. Outline of Presentation Introduction to voice biometrics The history of voice recognition and its milestones How voice biometric works Benefits and problems that voice recognition encounters Current applications and the future of this technology
  • 3. Introduction to Voice Biometrics -Voice biometrics is a growing technology in computer security -It uses a measurable, physical characteristic, or personal behavioral trait to verify and authenticate an individual -It uses what you are as a way to identify yourself -Compares two (2) samples of data and verifies if they match
  • 4. Speech Recognition vs Speaker Verification -The most important difference is that: -Speech recognition identifies what you are saying -Speaker verification verifies that you are who you say you are
  • 5. Speech Recognition A speech recognition system is designed to assist the speaker in accomplishing what that person wants to do
  • 6. Speaker Verification However, if an application needs to know who is speaking, then it must authenticate the person and verify that he or she is in fact that person
  • 7. Combining Speech recognition and speaker verification Speech recognition and speaker verification systems are combined to create voice biometric systems
  • 8. History of voice recognition -Radio Rex who was created by the Elmwood Button Company in 1922 -During the 1940’s and 1950’s the United States Department of Defense and MIT became the largest contributors to the speech recognition field -In the 1960’s and 1970’s, the technology can be attributed to the educational institutions -Today, voice recognition systems are important
  • 9. Voices are Unique -Voice recognition systems must be able to distinguish between various people’s voices -Frequency and Intensity -Training our body’s nasal and oral passages, as well as our lips, teeth, tongue, and jaw muscles
  • 10. How Voice Biometrics Work -Voices are nearly impossible to recreate -Digitizing a person's speech to produce a “voice print”
  • 11. Capturing a Voice Sample Within these smaller segments they are “captured” in a digital form and plotted on a spectrum.
  • 12. Verification Process The voiceprint is then stored as a table of numbers, where the presence of each dominant frequency in each segment is expressed as a binary number. Since all table entries are either a 1 or 0, each column can be read bottom to top as a long binary code.
  • 13. Trying to Fool Voice Recognition Systems -Voice biometrics should be able to tell the differences between real and fake users -One of the concerns about voice recognition systems is the threat of recording a person’s voice -Anti-spoofing is the key! -Challenge Response Mechanism
  • 14. Benefits of Voice Recognition Systems -Another layer of security for computer systems -Produces a more efficient and cost effective environment -Saves costs: Employee’s do not need ID access cards -Saves time for companies
  • 15. Problems with Voice Recognition Biometrics over one’s -Human voices do not necessarily remain the same lifetime -Uses of microphones -Environmental noise -Poor phone, or cellular connections -Vocal variations: accents -Telephone devices: voice samples are converted and transferred from an analog format to a digital format for processing
  • 16. Current Applications of Voice Biometrics -Security system for physical access entry into a building -Corrections industries: inmates on parole -Telephone companies use voice-enabling services -Voice verification in telephone banking: ATM machines -Voice verification in credit cards
  • 17. Voice Recognition on the Rise -Voice recognition applications are slowly growing -Vocent Solutions, Inc. suggested that: (1) Telephones are the primary means by which consumers will conduct financial transactions and access financial account information (2) Consumers know about the problem of identity theft (3) Consumers feel that PIN Numbers and passwords are not secure enough (4) A strong amount of concern exists when communicating confidential information over the telephone (5) As a result of these security concerns and fears, consumers would be willing to participate in a voice recognition system, and also feel that it could potentially reduce fraud as well as identity theft
  • 19. More Statistics -Voice recognition is on the rise as it has slowly been improving on its accuracy rates and meeting users’ needs for applications
  • 20. Conclusion The main purpose and benefit of a voice recognition system is the amount of security that it provides. Although voice recognition is mostly secure, it still has flaws. To aid its acceptance, this biometric system can be combined with more traditional security features to provide an additional layer of security. These can include using other biometrics, or security mechanisms such as RSA, PINs or a combination of several different mechanisms. Through further development, voice recognition can be one of the most successful and largest applications of biometrics in the future to come.

Hinweis der Redaktion

  1. In this biometric system a device captures a sample from a user and then compare it against the data contained in its database. The system then decides how well the two match and indicates whether or not an identification or verification has been achieved