Enhancing Web Application Security: Advanced Biometric Voice Verification for Two-Factor Authentication

Author:

Kamiński Kamil Adam12ORCID,Dobrowolski Andrzej Piotr3ORCID,Piotrowski Zbigniew3ORCID,Ścibiorek Przemysław4ORCID

Affiliation:

1. Institute of Optoelectronics, Military University of Technology, 2 Kaliski Street, 00-908 Warsaw, Poland

2. BITRES Sp. z o.o., 9/2 Chałubiński Street, 02-004 Warsaw, Poland

3. Faculty of Electronics, Military University of Technology, 2 Kaliski Street, 00-908 Warsaw, Poland

4. POL Cyber Command, 2 Buka Street, 05-119 Legionowo, Poland

Abstract

This paper presents a voice biometrics system implemented in a web application as part of a two-factor authentication (2FA) user login. The web-based application, via a client interface, runs registration, preprocessing, feature extraction and normalization, classification, and speaker verification procedures based on a modified Gaussian mixture model (GMM) algorithm adapted to the application requirements. The article describes in detail the internal modules of this ASR (Automatic Speaker Recognition) system. A comparison of the performance of competing ASR systems using the commercial NIST 2002 SRE voice dataset tested under the same conditions is also presented. In addition, it presents the results of the influence of the application of cepstral mean and variance normalization over a sliding window (WCMVN) and its relevance, especially for voice recordings recorded in varying acoustic tracks. The article also presents the results of the selection of a reference model representing an alternative hypothesis in the decision-making system, which significantly translates into an increase in the effectiveness of speaker verification. The final experiment presented is a test of the performance achieved in a varying acoustic environment during remote voice login to a web portal by the test group, as well as a final adjustment of the decision-making threshold.

Funder

The National Centre for Research and Development

the Military University of Technology under research

Publisher

MDPI AG

Subject

Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing,Control and Systems Engineering

Reference53 articles.

1. Blind Image Counterwatermarking—Hidden Data Filter;Piotrowski;Multimed Tools Appl.,2017

2. Desigining a mobile application on the example of a system for digital photos watermarking;Kaczmarek;Proceedings of the Radioelectronic Systems Conference 2019,2020

3. Hossain, M.N., Zaman, S.F.U., Khan, T.Z., Katha, S.A., Anwar, M.T., and Hossain, M.I. (2022, January 1–3). Implementing Biometric or Graphical Password Authentication in a Universal Three-Factor Authentication System. Proceedings of the 2022 4th International Conference on Computer Communication and the Internet, ICCCI, Chiba, Japan.

4. (2023, September 01). Two-Factor Authentication (2FA) Security Adoption Surges-|ChannelE2E. Available online: https://www.channele2e.com/news/two-factor-authentication-2fa-adoption-surges.

5. (2023, September 01). The 2021 State of the Auth Report: 2FA Climbs, While Password Managers and Biometrics Trend|Duo Security. Available online: https://duo.com/blog/the-2021-state-of-the-auth-report-2fa-climbs-password-managers-biometrics-trend.

Cited by 1 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3