An Efficient Voice Authentication System using Enhanced Inceptionv3 Algorithm
-
Published:2023-10-05
Issue:
Volume:
Page:379-393
-
ISSN:2788-7669
-
Container-title:Journal of Machine and Computing
-
language:en
-
Short-container-title:JMC
Author:
N Kaladharan1, R Arunkumar2
Affiliation:
1. Department of Computer Science and Engineering, FEAT, Annamalai University, Tamil Nadu, India. 2. Department of Computer Engineering, Government Polytechnic College, Theni, Tamil Nadu, India.
Abstract
Automatic voice authentication based on deep learning is a promising technology that has received much attention
from academia and industry. It has proven to be effective in a variety of applications, including biometric access control
systems. Using biometric data in such systems is difficult, particularly in a centralized setting. It introduces numerous risks,
such as information disclosure, unreliability, security, privacy, etc. Voice authentication systems are becoming increasingly
important in solving these issues. This is especially true if the device relies on voice commands from the user. This work
investigates the development of a text-independent voice authentication system. The spatial features of the voiceprint
(corresponding to the speech spectrum) are present in the speech signal as a result of the spectrogram, and the weighted wavelet
packet cepstral coefficients (W-WPCC) are effective for spatial feature extraction (corresponding to the speech spectrum). W-
WPCC characteristics are calculated by combining sub-band energies with sub-band spectral centroids using a weighting
scheme to generate noise-resistant acoustic characteristics. In addition, this work proposes an enhanced inception v3 model for
voice authentication. The proposed InceptionV3 system extracts feature from input data from the convolutional and pooling
layers. By employing fewer parameters, this architecture reduces the complexity of the convolution process while increasing
learning speed. Following model training, the enhanced Inception v3 model classifies audio samples as authenticated or not
based on extracted features. Experiments were carried out on the speech of five English speakers whose voices were collected
from YouTube. The results reveal that the suggested improved method, based on enhanced Inception v3 and trained on speech
spectrogram pictures, outperforms the existing methods. The approach generates tests with an average categorization accuracy
of 99%. Compared to the performance of these network models on the given dataset, the proposed enhanced Inception v3
network model achieves the best results regarding model training time, recognition accuracy, and stability.
Publisher
Anapub Publications
Subject
Electrical and Electronic Engineering,Computational Theory and Mathematics,Human-Computer Interaction,Computational Mechanics
Reference30 articles.
1. H. Park and T. Kim, “User Authentication Method via Speaker Recognition and Speech Synthesis Detection,” Security and Communication Networks, vol. 2022, pp. 1–10, Jan. 2022, doi: 10.1155/2022/5755785. 2. S. K. Wong and S. M. Yiu, “Location Spoofing Attack Detection with Pre-Installed Sensors in Mobile Devices,” Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), vol. 11, no. 4, pp. 16–30, Dec. 2020, doi: 10.22667/JOWUA.2020.12.31.016. 3. A. S. Kitana, T. Issa, and W. G. Isaac, “Towards an Epidemic SMS-based Cellular Botnet,” Journal of Internet Services and Information Security (JISIS), vol. 10, no. 4, pp. 38–58, Nov. 2020, doi: 10.22667/JISIS.2020.11.30.038. 4. G. S. Kasturi, A. Jain, and J. D. Singh, “Detection and Classification of Radio Frequency Jamming Attacks using Machine learning,” Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), vol. 11, no. 4, pp. 49–62, Dec. 2020, doi: 10.22667/JOWUA.2020.12.31.049. 5. A. L. Marra, F. Martinelli, F. Mercaldo, A. Saracino, and M. Sheikhalishahi, “A Distributed Framework for Collaborative and Dynamic Analysis of Android Malware,” Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), vol. 11, no. 3, pp. 1–28, Sep. 2020, doi: 10.22667/JOWUA.2020.09.30.001.
|
|