SlideShare ist ein Scribd-Unternehmen logo
1 von 41
Downloaden Sie, um offline zu lesen
Case Study
Phone-based Voice Biometrics
  for Remote Authentication
 Stephen Elliot, Ph.D., Assoc Professor
          Purdue University
                   &
    Andy Rolfe, VP of Development,
             Authentify Inc.
         02/06/07 – ASEC-106
Objective


• Objective:
  — Identity verification and authentication (binding a human
     to an electronic transaction) have become strategic
     business issues. How does a voice biometric system
     perform for a typical remote authentication business
     scenario, and what conclusions can we make about the
     use of such a system?
© The New Yorker Collection 1993 Peter Steiner from cartoonbank.com. All rights reserved.




… except Authentify
Overview


• Briefly giving you an overview of:
  —   Biometric use in security systems
  —   The authentication best practices used
  —   The test methods
  —   Sample data

What we are NOT covering in presentation:
  —   Voice biometric or signal processing technology (FFT, HMM, etc.)
  —   Making any statement about the applicability of the technology for
      your situation
Enrollment – Initial Screen
User Enters Registration Info
User Inputs Phone Number
The End User’s Phone Rings
The User Answers the Phone
The Authentication Process is Initiated
# Key Liveness Test
User Informed of Recordings
Please Speak Confirmation…
User Speaks Confirmation Number
Please Speak Phone Number…
User Speaks Telephone Number
Call Completed
Call Information from User
Biometrics in Security


• Biometrics primer:
   —   Biometrics are by their nature statistically based
   —   Biometrics should not be the sole authenticator
   —   Backup methods for those that cannot (somehow impaired)
   —   Still have “first time” (registration) challenge
   —   Quality of implementation critical
         • privacy,
         • legal issues
         • Multi-modal UI not easy
Voice Biometrics


• Why voice?
   —   Familiar paradigm; Very user acceptable; “business like”
   —   Multi-factor authentication in one session
   —   Real-time, undeniable contact for remote authentication
   —   Highly auditable
   —   Out of band trusted network
   —   Both physiological and behavioral
   —   Variable, dynamic samples
   —   No hardware deployment or training
Ease of Use & Intrusiveness (previous study)


   70.00%                                        100.00%
   60.00%
   50.00%                                        80.00%

   40.00%                                        60.00%
   30.00%
   20.00%                                        40.00%

   10.00%
                                                 20.00%
   0.00%
            Not at all   4   3   2     Very       0.00%
            Intrusive                Intrusive             Very Difficult   Difficult   Neutral   Easy   Very Easy




  “I very much like the idea of voice
  identification. This process
  surpasses any other method of
  protecting my identity and SSN that
  I have seen. BRAVO!!

  JoAnn W., Financial Advisory Firm
Security Best Practices


• Policies define process requirements
   —   Policy will (should) reflect risk profile
   —   Policy must account for risk for each factor of authentication
   —   Policy will define which factors will (should) be used & when

• Collect and use as many factors as possible
   —   Allows layering and substitution of factors depending on risks

• Fraudster may know everything about you,
        but does not mean they can answer your telephone
Purdue Study


• Why study?
  —   No live system studies available
  —   Implementation specific
  —   Excellent resource nearby (Purdue University Biometrics Lab)
  —   Baseline for future studies
        • biometric aging,
        • technology changes,
        • etc.
Biometric Comparisons




     International Biometric Product Testing Initiative (May – Dec 2000) by National Physical Laboratory, England
                       [ sponsored by the Communications Electronics Security Group (CESG) ]
System used for Study


• This biometric study utilized a commercially available, remote,
  service oriented security system.
• This system is actively being used by many corporations for mainly
  Internet commerce and financial applications at a rate of
  approximately 1.5M transactions per month.
• The test application was run using this active service environment
  to best test "real life" performance of the technology.
• Test system implementation:
  —   SOA
  —   2 step application
         • Registration
         • Verification
  —   Purdue University lab environment
Service Architecture

   Engage the user, their computer and their telephone in a
   synchronized exchange for a strong out-of-band authentication…
                                                                   Users’ Web Session



                                                Internet
              Web
              Servers         Applet                                                       End
                                                                                           User
  Corporate
  Web Site
                                                                    Bind the
                         https XML
                                                                    Web session
                                                                    the computer,
                                                                    the phone and
                                                                    the Person

               Authentify
                                   PBX
               Service Ctr.
                                         Public Switched Telephone Network      555-333-2399
                                                     ( PSTN )
Roles & Responsibilities


•   Authentify responsibilities:
     —   Design and implementation of enrollment & verification voice applications
     —   Operation of the commercial service center in Chicago

•   Joint responsibilities
     —   Development of the test plan
     —   Data collection and reporting
     —   Data analysis and reports

•   Purdue biometric lab responsibilities:
     —   Recruitment and instruction of test subjects
     —   Acquisition, operation and maintenance of equipment used by test subjects
     —   Provide assistance to ensure proper testing procedures
Biometrics Lab


• The Biometrics Lab at Purdue
  is designed for research,
  teaching, and testing
• Testing evaluation was
  approved by the Institutional
  Review Board at Purdue
  University
• This research is typical of the
  lab’s partnership with
  company’s focusing on “applied
  research”
• The lab is part of CERIAS
Test Protocol


• Data was collected at the Purdue University Biometrics Standards,
  Performance, and Assurance Laboratory, in West Lafayette,
  Indiana.
• The experimental area consisted of a room with minimal ambient
  noise.
   —   Noise that was present was predominantly voices of other people, as
       the room was utilized for other purposes during the experiment.
   —   Since more than one individual could do the study at the same time
       and other individuals could be talking, noise conditions were
       collected during the study.
Phones & Network Providers


•   The land-based phone was a Vodavi           •   The Skype VoIP system used a
    Starplus single line telephone.                 Linksys CIT200 Skype phone
     —   Land line provided by the university
                                                •   Cell phone services used:
•   The Vonage VoIP system utilized a                —   T-Mobile
    Linksys phone adapter and Uniden                 —   Virgin Mobile
    900 MHz cordless phone.
                                                     —   Boost Mobile
     —   Network utilized was provided by the
         university                                  —   Tracphone

     —   Network Speed 8,600 Kb/s upload /           —   Simple Freedom Wireless
         86,000 Kb/s download
Data Capture


• The biometric system consisted of:
  —   Test subject web site where the sessions are initiated and the survey
      results are captured
  —   Data capture enhancements to session processing
  —   Post processing of voice samples for more thorough test matrix
      coverage

• Used combined speech recognition and speaker verification
• Used text prompted verification method (dynamic version of text
  dependent verification)
• Did not use adaptation; did not test identification
Test Data


•   Tests were automated to enable repeatable measurement of enrollment
    and verification rates, and to capture the following data:
    —   Subject Identifier
    —   Trial Code (predetermined)
    —   Telephone Number
    —   Telephony Type (Landline, mobile, VoIP)
    —   Telephone Manufacturer & Model
    —   Telephone Location (address)
    —   Signal Strength (mobile phone only)
    —   Background Noise (Low | Med | High)
    —   Background Noise Type (Music | Speech | Noise)
    —   Subject’s Voice Health (Normal | Hoarse | Very Hoarse)
Data Analysis


• Data collection occurred in a indoor office environment
  —   Conversational background noise

• The test sessions captured all data utilized, so no preexisting
  sample data was used.
• Enrollment templates and verification samples were compared both
  in real-time and off-line after all test data had been collected.
• The combination of real-time sample capture and off-line
  comparison helps generate a wider range of performance data.
Authentify-Purdue Study Results
                         Same Channel Performance -- Landline Verification vs. Landline Voiceprint

               50.00%


               45.00%


               40.00%


               35.00%


               30.00%
  Error Rate




               25.00%


               20.00%


               15.00%
                                            Land v Land
                                                                                                9.00%
               10.00%
                                                                       False Reject

               5.00%            2.93%                         3.61%

                        1.47%                                                    False Accept     0.49%
                                                                     0.49%
               0.00%
                                Low                            Med                              High
                                                          Security Level
Authentify-Purdue Study Results
                                Same Channel Performance -- Cell Verification vs Cell Voiceprint

               50.00%


               45.00%


               40.00%


               35.00%


               30.00%
  Error Rate




               25.00%


               20.00%

                                                      Cell v Cell
               15.00%
                                                                                                                 12.87%
                                                                                    False Reject
               10.00%


                           3.26%                                    2.63%
               5.00%
                                                                                               False Accept
                                                                            1.63%                             1.08%
                        1.90%
               0.00%
                            Low                                      Med                                      High
                                                              Security Level
Authentify-Purdue Study Results
                        Cross Channel Performance -- Cell Verification vs. Landline Voiceprint

               50.00%


               45.00%


               40.00%


               35.00%                                                                           37.43%


               30.00%
                                                                                 False Reject
  Error Rate




               25.00%
                                                    Cell v Land
               20.00%


               15.00%


               10.00%    11.90%                           11.94%


               5.00%
                                                                        False Accept
                          0.00%                            0.00%                                0.00%
               0.00%
                          Low                               Med                                  High
                                                       Security Level
Authentify-Purdue Study Results
                                        Batch: Landline Verification vs. Landline Voiceprint

               50.00%


               45.00%


               40.00%


               35.00%


               30.00%
  Error Rate




               25.00%


               20.00%


               15.00%


               10.00%
                                                                                         False Reject
                                                                                                        7.10%
               5.00%            3.05%
                                                              2.73%
                                                                                           False Accept
                        1.64%                                            0.71%                          0.12%
               0.00%
                          Med-High                                High                           Very-High
                                                              Security Level
Conclusions


• Dynamic sampling is an effective method of supporting multi-factor
  authentication in a single interaction
• Single voice biometric template capture OK for low to medium risk
  applications when layered
• Best to use phone number or channel specific templates for
  medium to high risk applications
• Use known phone number for verification to spawn new enrollment
  session on secondary device (e.g. use existing landline print to
  enroll on your new cell phone)
Conclusions


• We have got more work to do:
  —   Qualify batch analysis procedures
  —   Cell phone connection quality; how to compensate?
  —   VoIP is worst. Why?
  —   How much do behavioral characteristics play a role? Do subject
      utterances change when they “know” they are acting as imposter?
  —   How well do biometric templates age? Use of adaptation?
  —   Can we leverage multiple verification engines to obtain a better
      result?
  —   What role do accents play? Do they only affect reco’, or biometric
      performance too?
Contact Information


Andrew Rolfe                       Stephen Elliott, Ph.D.
V.P. of Development & Operations   Associate Professor & Director of
                                     Biometric Standards, Performance,
                                     and Assurance Laboratory
Phone: 773-243-0339                Phone: 765-494-1088
Email: andy.rolfe@authentify.com   Email: elliott@purdue.edu


Authentify, Inc.                   Purdue University
8745 W. Higgins Road, Suite 240    401 N. Grant Street
Chicago, Illinois, 60631           West Lafayette, IN, 47906
www.authentify.com                 www.biotown.purdue.edu
Questions?


             Authentify: Booth 803

Weitere ähnliche Inhalte

Andere mochten auch

Design of a hand geometry based biometric system
Design of a hand geometry based biometric systemDesign of a hand geometry based biometric system
Design of a hand geometry based biometric systemBhavi Bhatia
 
iPhone 5S Fingerprint Sensor teardown reverse costing report by published Yol...
iPhone 5S Fingerprint Sensor teardown reverse costing report by published Yol...iPhone 5S Fingerprint Sensor teardown reverse costing report by published Yol...
iPhone 5S Fingerprint Sensor teardown reverse costing report by published Yol...Yole Developpement
 
Bio-Authentication (FIDO) and PKI Trends in Korea
Bio-Authentication (FIDO) and PKI Trends in KoreaBio-Authentication (FIDO) and PKI Trends in Korea
Bio-Authentication (FIDO) and PKI Trends in KoreaFIDO Alliance
 
The Benefits of Using a Biometric Timeclock in Workforce Management
The Benefits of Using a Biometric Timeclock in Workforce ManagementThe Benefits of Using a Biometric Timeclock in Workforce Management
The Benefits of Using a Biometric Timeclock in Workforce ManagementM2SYS Technology
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyAlfred Oboi
 
Samsung case study
Samsung case studySamsung case study
Samsung case studyAhmed Omar
 
Voice Biometrics – The way forward in remote user authentication
Voice Biometrics – The way forward in remote user authenticationVoice Biometrics – The way forward in remote user authentication
Voice Biometrics – The way forward in remote user authenticationUniphore
 

Andere mochten auch (8)

Basic Analysis
Basic AnalysisBasic Analysis
Basic Analysis
 
Design of a hand geometry based biometric system
Design of a hand geometry based biometric systemDesign of a hand geometry based biometric system
Design of a hand geometry based biometric system
 
iPhone 5S Fingerprint Sensor teardown reverse costing report by published Yol...
iPhone 5S Fingerprint Sensor teardown reverse costing report by published Yol...iPhone 5S Fingerprint Sensor teardown reverse costing report by published Yol...
iPhone 5S Fingerprint Sensor teardown reverse costing report by published Yol...
 
Bio-Authentication (FIDO) and PKI Trends in Korea
Bio-Authentication (FIDO) and PKI Trends in KoreaBio-Authentication (FIDO) and PKI Trends in Korea
Bio-Authentication (FIDO) and PKI Trends in Korea
 
The Benefits of Using a Biometric Timeclock in Workforce Management
The Benefits of Using a Biometric Timeclock in Workforce ManagementThe Benefits of Using a Biometric Timeclock in Workforce Management
The Benefits of Using a Biometric Timeclock in Workforce Management
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technology
 
Samsung case study
Samsung case studySamsung case study
Samsung case study
 
Voice Biometrics – The way forward in remote user authentication
Voice Biometrics – The way forward in remote user authenticationVoice Biometrics – The way forward in remote user authentication
Voice Biometrics – The way forward in remote user authentication
 

Ähnlich wie (2007) Case Study: Phone-based Voice Biometrics for Remote Authentication

IoT testing and quality assurance indicthreads
IoT testing and quality assurance indicthreadsIoT testing and quality assurance indicthreads
IoT testing and quality assurance indicthreadsIndicThreads
 
7signal Wi-Fi Performance Management - 2017 sales presentation
7signal Wi-Fi Performance Management - 2017 sales presentation7signal Wi-Fi Performance Management - 2017 sales presentation
7signal Wi-Fi Performance Management - 2017 sales presentationEric Camulli
 
ThousandEyes EMEA - WebEx Performance Monitoring
ThousandEyes EMEA - WebEx Performance MonitoringThousandEyes EMEA - WebEx Performance Monitoring
ThousandEyes EMEA - WebEx Performance MonitoringThousandEyes
 
Third Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure ProgramThird Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure ProgramEnergySec
 
i_Mobile Testing Service Desk_Own
i_Mobile Testing Service Desk_Owni_Mobile Testing Service Desk_Own
i_Mobile Testing Service Desk_OwnGopi Raghavendra
 
Levine, Howard resume May 2015
Levine, Howard resume May 2015Levine, Howard resume May 2015
Levine, Howard resume May 2015Howard Levine
 
Mobile Testing Service Desk_Own.ppt
Mobile Testing Service Desk_Own.pptMobile Testing Service Desk_Own.ppt
Mobile Testing Service Desk_Own.pptQA Programmer
 
Intelligent infra arpan pal_bit
Intelligent infra arpan pal_bitIntelligent infra arpan pal_bit
Intelligent infra arpan pal_bitArpan Pal
 
Experitest & Cigniti Co-Webinar -
Experitest & Cigniti Co-Webinar -Experitest & Cigniti Co-Webinar -
Experitest & Cigniti Co-Webinar -Experitest
 
Webex Control Hub - IT Control no matter where they work
Webex Control Hub -IT Control no matter where they workWebex Control Hub -IT Control no matter where they work
Webex Control Hub - IT Control no matter where they work Cisco Webex
 
Cyber Security - Boundary Defense Mechanisms
Cyber Security - Boundary Defense MechanismsCyber Security - Boundary Defense Mechanisms
Cyber Security - Boundary Defense MechanismsJim Kaplan CIA CFE
 
Sestek presentation 2014
Sestek presentation 2014Sestek presentation 2014
Sestek presentation 2014Mustafa Kuğu
 
Cyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdfCyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdfNaveenKumar470500
 
WebEx performance monitoring
WebEx performance monitoringWebEx performance monitoring
WebEx performance monitoringThousandEyes
 
Curiosity and fourTheorem present: From Coverage Guesswork to Targeted Test G...
Curiosity and fourTheorem present: From Coverage Guesswork to Targeted Test G...Curiosity and fourTheorem present: From Coverage Guesswork to Targeted Test G...
Curiosity and fourTheorem present: From Coverage Guesswork to Targeted Test G...Curiosity Software Ireland
 
Network Assurance and Testing During the Migration to VoIP
Network Assurance and Testing During the Migration to VoIPNetwork Assurance and Testing During the Migration to VoIP
Network Assurance and Testing During the Migration to VoIPVideoguy
 
ClueCon 2018: Real-time Communications Monitoring 101 by Varun Singh
ClueCon 2018: Real-time Communications Monitoring 101 by Varun SinghClueCon 2018: Real-time Communications Monitoring 101 by Varun Singh
ClueCon 2018: Real-time Communications Monitoring 101 by Varun Singhcallstats.io
 
Intelligent Digital Mesh Testing
Intelligent Digital Mesh TestingIntelligent Digital Mesh Testing
Intelligent Digital Mesh TestingNagarro
 

Ähnlich wie (2007) Case Study: Phone-based Voice Biometrics for Remote Authentication (20)

IoT testing and quality assurance indicthreads
IoT testing and quality assurance indicthreadsIoT testing and quality assurance indicthreads
IoT testing and quality assurance indicthreads
 
7signal Wi-Fi Performance Management - 2017 sales presentation
7signal Wi-Fi Performance Management - 2017 sales presentation7signal Wi-Fi Performance Management - 2017 sales presentation
7signal Wi-Fi Performance Management - 2017 sales presentation
 
ThousandEyes EMEA - WebEx Performance Monitoring
ThousandEyes EMEA - WebEx Performance MonitoringThousandEyes EMEA - WebEx Performance Monitoring
ThousandEyes EMEA - WebEx Performance Monitoring
 
Third Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure ProgramThird Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure Program
 
i_Mobile Testing Service Desk_Own
i_Mobile Testing Service Desk_Owni_Mobile Testing Service Desk_Own
i_Mobile Testing Service Desk_Own
 
Levine, Howard resume May 2015
Levine, Howard resume May 2015Levine, Howard resume May 2015
Levine, Howard resume May 2015
 
Mobile Testing Service Desk_Own.ppt
Mobile Testing Service Desk_Own.pptMobile Testing Service Desk_Own.ppt
Mobile Testing Service Desk_Own.ppt
 
Intelligent infra arpan pal_bit
Intelligent infra arpan pal_bitIntelligent infra arpan pal_bit
Intelligent infra arpan pal_bit
 
Experitest & Cigniti Co-Webinar -
Experitest & Cigniti Co-Webinar -Experitest & Cigniti Co-Webinar -
Experitest & Cigniti Co-Webinar -
 
Webex Control Hub - IT Control no matter where they work
Webex Control Hub -IT Control no matter where they workWebex Control Hub -IT Control no matter where they work
Webex Control Hub - IT Control no matter where they work
 
Cyber Security - Boundary Defense Mechanisms
Cyber Security - Boundary Defense MechanismsCyber Security - Boundary Defense Mechanisms
Cyber Security - Boundary Defense Mechanisms
 
Sestek presentation 2014
Sestek presentation 2014Sestek presentation 2014
Sestek presentation 2014
 
Cyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdfCyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdf
 
Cyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdfCyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdf
 
TechTalk: Getting to Know Perfecto
TechTalk: Getting to Know PerfectoTechTalk: Getting to Know Perfecto
TechTalk: Getting to Know Perfecto
 
WebEx performance monitoring
WebEx performance monitoringWebEx performance monitoring
WebEx performance monitoring
 
Curiosity and fourTheorem present: From Coverage Guesswork to Targeted Test G...
Curiosity and fourTheorem present: From Coverage Guesswork to Targeted Test G...Curiosity and fourTheorem present: From Coverage Guesswork to Targeted Test G...
Curiosity and fourTheorem present: From Coverage Guesswork to Targeted Test G...
 
Network Assurance and Testing During the Migration to VoIP
Network Assurance and Testing During the Migration to VoIPNetwork Assurance and Testing During the Migration to VoIP
Network Assurance and Testing During the Migration to VoIP
 
ClueCon 2018: Real-time Communications Monitoring 101 by Varun Singh
ClueCon 2018: Real-time Communications Monitoring 101 by Varun SinghClueCon 2018: Real-time Communications Monitoring 101 by Varun Singh
ClueCon 2018: Real-time Communications Monitoring 101 by Varun Singh
 
Intelligent Digital Mesh Testing
Intelligent Digital Mesh TestingIntelligent Digital Mesh Testing
Intelligent Digital Mesh Testing
 

Mehr von International Center for Biometric Research

An Investigation into Biometric Signature Capture Device Performance and User...
An Investigation into Biometric Signature Capture Device Performance and User...An Investigation into Biometric Signature Capture Device Performance and User...
An Investigation into Biometric Signature Capture Device Performance and User...International Center for Biometric Research
 
Advances in testing and evaluation using Human-Biometric sensor interaction m...
Advances in testing and evaluation using Human-Biometric sensor interaction m...Advances in testing and evaluation using Human-Biometric sensor interaction m...
Advances in testing and evaluation using Human-Biometric sensor interaction m...International Center for Biometric Research
 
(2010) Fingerprint recognition performance evaluation for mobile ID applications
(2010) Fingerprint recognition performance evaluation for mobile ID applications(2010) Fingerprint recognition performance evaluation for mobile ID applications
(2010) Fingerprint recognition performance evaluation for mobile ID applicationsInternational Center for Biometric Research
 

Mehr von International Center for Biometric Research (20)

HBSI Automation Using the Kinect
HBSI Automation Using the KinectHBSI Automation Using the Kinect
HBSI Automation Using the Kinect
 
IT 34500
IT 34500IT 34500
IT 34500
 
An Investigation into Biometric Signature Capture Device Performance and User...
An Investigation into Biometric Signature Capture Device Performance and User...An Investigation into Biometric Signature Capture Device Performance and User...
An Investigation into Biometric Signature Capture Device Performance and User...
 
Entropy of Fingerprints
Entropy of FingerprintsEntropy of Fingerprints
Entropy of Fingerprints
 
Biometric and usability
Biometric and usabilityBiometric and usability
Biometric and usability
 
Examining Intra-Visit Iris Stability - Visit 4
Examining Intra-Visit Iris Stability - Visit 4Examining Intra-Visit Iris Stability - Visit 4
Examining Intra-Visit Iris Stability - Visit 4
 
Examining Intra-Visit Iris Stability - Visit 6
Examining Intra-Visit Iris Stability - Visit 6Examining Intra-Visit Iris Stability - Visit 6
Examining Intra-Visit Iris Stability - Visit 6
 
Examining Intra-Visit Iris Stability - Visit 2
Examining Intra-Visit Iris Stability - Visit 2Examining Intra-Visit Iris Stability - Visit 2
Examining Intra-Visit Iris Stability - Visit 2
 
Examining Intra-Visit Iris Stability - Visit 1
Examining Intra-Visit Iris Stability - Visit 1Examining Intra-Visit Iris Stability - Visit 1
Examining Intra-Visit Iris Stability - Visit 1
 
Examining Intra-Visit Iris Stability - Visit 3
Examining Intra-Visit Iris Stability - Visit 3Examining Intra-Visit Iris Stability - Visit 3
Examining Intra-Visit Iris Stability - Visit 3
 
Best Practices in Reporting Time Duration in Biometrics
Best Practices in Reporting Time Duration in BiometricsBest Practices in Reporting Time Duration in Biometrics
Best Practices in Reporting Time Duration in Biometrics
 
Examining Intra-Visit Iris Stability - Visit 5
Examining Intra-Visit Iris Stability - Visit 5Examining Intra-Visit Iris Stability - Visit 5
Examining Intra-Visit Iris Stability - Visit 5
 
Standards and Academia
Standards and AcademiaStandards and Academia
Standards and Academia
 
Interoperability and the Stability Score Index
Interoperability and the Stability Score IndexInteroperability and the Stability Score Index
Interoperability and the Stability Score Index
 
Advances in testing and evaluation using Human-Biometric sensor interaction m...
Advances in testing and evaluation using Human-Biometric sensor interaction m...Advances in testing and evaluation using Human-Biometric sensor interaction m...
Advances in testing and evaluation using Human-Biometric sensor interaction m...
 
Cerias talk on testing and evaluation
Cerias talk on testing and evaluationCerias talk on testing and evaluation
Cerias talk on testing and evaluation
 
IT 54500 overview
IT 54500 overviewIT 54500 overview
IT 54500 overview
 
Ben thesis slideshow
Ben thesis slideshowBen thesis slideshow
Ben thesis slideshow
 
(2010) Fingerprint recognition performance evaluation for mobile ID applications
(2010) Fingerprint recognition performance evaluation for mobile ID applications(2010) Fingerprint recognition performance evaluation for mobile ID applications
(2010) Fingerprint recognition performance evaluation for mobile ID applications
 
ICBR Databases
ICBR DatabasesICBR Databases
ICBR Databases
 

Kürzlich hochgeladen

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 

Kürzlich hochgeladen (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 

(2007) Case Study: Phone-based Voice Biometrics for Remote Authentication

  • 1. Case Study Phone-based Voice Biometrics for Remote Authentication Stephen Elliot, Ph.D., Assoc Professor Purdue University & Andy Rolfe, VP of Development, Authentify Inc. 02/06/07 – ASEC-106
  • 2. Objective • Objective: — Identity verification and authentication (binding a human to an electronic transaction) have become strategic business issues. How does a voice biometric system perform for a typical remote authentication business scenario, and what conclusions can we make about the use of such a system?
  • 3. © The New Yorker Collection 1993 Peter Steiner from cartoonbank.com. All rights reserved. … except Authentify
  • 4. Overview • Briefly giving you an overview of: — Biometric use in security systems — The authentication best practices used — The test methods — Sample data What we are NOT covering in presentation: — Voice biometric or signal processing technology (FFT, HMM, etc.) — Making any statement about the applicability of the technology for your situation
  • 8. The End User’s Phone Rings
  • 9. The User Answers the Phone
  • 12. User Informed of Recordings
  • 15. Please Speak Phone Number…
  • 19. Biometrics in Security • Biometrics primer: — Biometrics are by their nature statistically based — Biometrics should not be the sole authenticator — Backup methods for those that cannot (somehow impaired) — Still have “first time” (registration) challenge — Quality of implementation critical • privacy, • legal issues • Multi-modal UI not easy
  • 20. Voice Biometrics • Why voice? — Familiar paradigm; Very user acceptable; “business like” — Multi-factor authentication in one session — Real-time, undeniable contact for remote authentication — Highly auditable — Out of band trusted network — Both physiological and behavioral — Variable, dynamic samples — No hardware deployment or training
  • 21. Ease of Use & Intrusiveness (previous study) 70.00% 100.00% 60.00% 50.00% 80.00% 40.00% 60.00% 30.00% 20.00% 40.00% 10.00% 20.00% 0.00% Not at all 4 3 2 Very 0.00% Intrusive Intrusive Very Difficult Difficult Neutral Easy Very Easy “I very much like the idea of voice identification. This process surpasses any other method of protecting my identity and SSN that I have seen. BRAVO!! JoAnn W., Financial Advisory Firm
  • 22. Security Best Practices • Policies define process requirements — Policy will (should) reflect risk profile — Policy must account for risk for each factor of authentication — Policy will define which factors will (should) be used & when • Collect and use as many factors as possible — Allows layering and substitution of factors depending on risks • Fraudster may know everything about you, but does not mean they can answer your telephone
  • 23. Purdue Study • Why study? — No live system studies available — Implementation specific — Excellent resource nearby (Purdue University Biometrics Lab) — Baseline for future studies • biometric aging, • technology changes, • etc.
  • 24. Biometric Comparisons International Biometric Product Testing Initiative (May – Dec 2000) by National Physical Laboratory, England [ sponsored by the Communications Electronics Security Group (CESG) ]
  • 25. System used for Study • This biometric study utilized a commercially available, remote, service oriented security system. • This system is actively being used by many corporations for mainly Internet commerce and financial applications at a rate of approximately 1.5M transactions per month. • The test application was run using this active service environment to best test "real life" performance of the technology. • Test system implementation: — SOA — 2 step application • Registration • Verification — Purdue University lab environment
  • 26. Service Architecture Engage the user, their computer and their telephone in a synchronized exchange for a strong out-of-band authentication… Users’ Web Session Internet Web Servers Applet End User Corporate Web Site Bind the https XML Web session the computer, the phone and the Person Authentify PBX Service Ctr. Public Switched Telephone Network 555-333-2399 ( PSTN )
  • 27. Roles & Responsibilities • Authentify responsibilities: — Design and implementation of enrollment & verification voice applications — Operation of the commercial service center in Chicago • Joint responsibilities — Development of the test plan — Data collection and reporting — Data analysis and reports • Purdue biometric lab responsibilities: — Recruitment and instruction of test subjects — Acquisition, operation and maintenance of equipment used by test subjects — Provide assistance to ensure proper testing procedures
  • 28. Biometrics Lab • The Biometrics Lab at Purdue is designed for research, teaching, and testing • Testing evaluation was approved by the Institutional Review Board at Purdue University • This research is typical of the lab’s partnership with company’s focusing on “applied research” • The lab is part of CERIAS
  • 29. Test Protocol • Data was collected at the Purdue University Biometrics Standards, Performance, and Assurance Laboratory, in West Lafayette, Indiana. • The experimental area consisted of a room with minimal ambient noise. — Noise that was present was predominantly voices of other people, as the room was utilized for other purposes during the experiment. — Since more than one individual could do the study at the same time and other individuals could be talking, noise conditions were collected during the study.
  • 30. Phones & Network Providers • The land-based phone was a Vodavi • The Skype VoIP system used a Starplus single line telephone. Linksys CIT200 Skype phone — Land line provided by the university • Cell phone services used: • The Vonage VoIP system utilized a — T-Mobile Linksys phone adapter and Uniden — Virgin Mobile 900 MHz cordless phone. — Boost Mobile — Network utilized was provided by the university — Tracphone — Network Speed 8,600 Kb/s upload / — Simple Freedom Wireless 86,000 Kb/s download
  • 31. Data Capture • The biometric system consisted of: — Test subject web site where the sessions are initiated and the survey results are captured — Data capture enhancements to session processing — Post processing of voice samples for more thorough test matrix coverage • Used combined speech recognition and speaker verification • Used text prompted verification method (dynamic version of text dependent verification) • Did not use adaptation; did not test identification
  • 32. Test Data • Tests were automated to enable repeatable measurement of enrollment and verification rates, and to capture the following data: — Subject Identifier — Trial Code (predetermined) — Telephone Number — Telephony Type (Landline, mobile, VoIP) — Telephone Manufacturer & Model — Telephone Location (address) — Signal Strength (mobile phone only) — Background Noise (Low | Med | High) — Background Noise Type (Music | Speech | Noise) — Subject’s Voice Health (Normal | Hoarse | Very Hoarse)
  • 33. Data Analysis • Data collection occurred in a indoor office environment — Conversational background noise • The test sessions captured all data utilized, so no preexisting sample data was used. • Enrollment templates and verification samples were compared both in real-time and off-line after all test data had been collected. • The combination of real-time sample capture and off-line comparison helps generate a wider range of performance data.
  • 34. Authentify-Purdue Study Results Same Channel Performance -- Landline Verification vs. Landline Voiceprint 50.00% 45.00% 40.00% 35.00% 30.00% Error Rate 25.00% 20.00% 15.00% Land v Land 9.00% 10.00% False Reject 5.00% 2.93% 3.61% 1.47% False Accept 0.49% 0.49% 0.00% Low Med High Security Level
  • 35. Authentify-Purdue Study Results Same Channel Performance -- Cell Verification vs Cell Voiceprint 50.00% 45.00% 40.00% 35.00% 30.00% Error Rate 25.00% 20.00% Cell v Cell 15.00% 12.87% False Reject 10.00% 3.26% 2.63% 5.00% False Accept 1.63% 1.08% 1.90% 0.00% Low Med High Security Level
  • 36. Authentify-Purdue Study Results Cross Channel Performance -- Cell Verification vs. Landline Voiceprint 50.00% 45.00% 40.00% 35.00% 37.43% 30.00% False Reject Error Rate 25.00% Cell v Land 20.00% 15.00% 10.00% 11.90% 11.94% 5.00% False Accept 0.00% 0.00% 0.00% 0.00% Low Med High Security Level
  • 37. Authentify-Purdue Study Results Batch: Landline Verification vs. Landline Voiceprint 50.00% 45.00% 40.00% 35.00% 30.00% Error Rate 25.00% 20.00% 15.00% 10.00% False Reject 7.10% 5.00% 3.05% 2.73% False Accept 1.64% 0.71% 0.12% 0.00% Med-High High Very-High Security Level
  • 38. Conclusions • Dynamic sampling is an effective method of supporting multi-factor authentication in a single interaction • Single voice biometric template capture OK for low to medium risk applications when layered • Best to use phone number or channel specific templates for medium to high risk applications • Use known phone number for verification to spawn new enrollment session on secondary device (e.g. use existing landline print to enroll on your new cell phone)
  • 39. Conclusions • We have got more work to do: — Qualify batch analysis procedures — Cell phone connection quality; how to compensate? — VoIP is worst. Why? — How much do behavioral characteristics play a role? Do subject utterances change when they “know” they are acting as imposter? — How well do biometric templates age? Use of adaptation? — Can we leverage multiple verification engines to obtain a better result? — What role do accents play? Do they only affect reco’, or biometric performance too?
  • 40. Contact Information Andrew Rolfe Stephen Elliott, Ph.D. V.P. of Development & Operations Associate Professor & Director of Biometric Standards, Performance, and Assurance Laboratory Phone: 773-243-0339 Phone: 765-494-1088 Email: andy.rolfe@authentify.com Email: elliott@purdue.edu Authentify, Inc. Purdue University 8745 W. Higgins Road, Suite 240 401 N. Grant Street Chicago, Illinois, 60631 West Lafayette, IN, 47906 www.authentify.com www.biotown.purdue.edu
  • 41. Questions? Authentify: Booth 803