Voice can be an option for bio-metric authentication but the main question is can it provide the same level of accuracy as other bio-metric techniques provide and can we deploy it in advanced network security. We will discuss it later. First we have to know about the different types of algorithm that are used for the interpretation of the voice. These are explained as following below. These are explained as following below.
- Fixed Vocabulary Verification:
In fixed vocabulary verification we are given a random set of vocabularies or we can say pool of words and for to successfully enter to the system each word in vocabulary is repeated so as to create a user model which is unique. Pool of words generally consist digits 0-9 and some different words.
- Fixed Phase Verification:
It uses fixed phrase for the successful authentication and involves comparison of just two wave form. There is a tolerance b/w the two wave form and if they match within the certain limit of the tolerance than it can be assumed that this is the legitimate person and thus permission is granted. The technology used for the matching of two wave form is dynamic time warping.
- Text Independent Verification:
In text independent verification you are free to speak anything, use only phrase for the authentication as now the person or the user is measured against all the other models. This method is not suitable for biometric network security as it involves continuous speech evaluation.
- Flexible Vocabulary Verification:
User is able to use any word for authentication. We have to repeat series of words from lexicon that covers the whole phonemes.
How Bio-metric can be spoofed:
- Compromising with template.
- Attacking the fallback system.
- Attack the physical voice.
Attention reader! Don’t stop learning now. Get hold of all the important CS Theory concepts for SDE interviews with the CS Theory Course at a student-friendly price and become industry ready.
- Difference between Substitution Cipher Technique and Transposition Cipher Technique
- Difference between Network Security and Cyber Security
- Difference between Information Security and Network Security
- Difference between Cyber Security and Information Security
- How Security System Should Evolve to Handle Cyber Security Threats and Vulnerabilities?
- Port Security in Computer Network
- Network Security
- A Model for Network Security
- Cryptography and Network Security Principles
- Protection Methods for Network Security
- Difference between Security Group and Network ACL in AWS
- Pivoting - Moving Inside a Network (Cyber Security)
- Voice over Internet Protocol (VoIP)
- Vishing (Voice Phishing)
- Difference between Google Voice and Google Hangouts
- Difference between Google Voice and Google Duo
- Difference between Google Voice and Dingtone
- Difference between Google Voice and JustCall
- Difference between Google Voice and Skype
- LZW (Lempel–Ziv–Welch) Compression technique
If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to email@example.com. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.