Enhancing Web Application Security: Advanced Biometric Voice Verification for Two-Factor Authentication

被引:1
|
作者
Kaminski, Kamil Adam [1 ,2 ]
Dobrowolski, Andrzej Piotr [3 ]
Piotrowski, Zbigniew [3 ]
Scibiorek, Przemyslaw [4 ]
机构
[1] Mil Univ Technol, Inst Optoelect, 2 Kaliski St, PL-00908 Warsaw, Poland
[2] BITRES Sp Zoo, 9-2 Chalubinski St, PL-02004 Warsaw, Poland
[3] Mil Univ Technol, Fac Elect, 2 Kaliski St, PL-00908 Warsaw, Poland
[4] POL Cyber Command, 2 Buka St, PL-05119 Legionowo, Poland
关键词
speaker recognition; biometrics (access control); authentication; cepstral analysis; Gaussian mixture model; genetic algorithms; system verification; RECOGNITION;
D O I
10.3390/electronics12183791
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a voice biometrics system implemented in a web application as part of a two-factor authentication (2FA) user login. The web-based application, via a client interface, runs registration, preprocessing, feature extraction and normalization, classification, and speaker verification procedures based on a modified Gaussian mixture model (GMM) algorithm adapted to the application requirements. The article describes in detail the internal modules of this ASR (Automatic Speaker Recognition) system. A comparison of the performance of competing ASR systems using the commercial NIST 2002 SRE voice dataset tested under the same conditions is also presented. In addition, it presents the results of the influence of the application of cepstral mean and variance normalization over a sliding window (WCMVN) and its relevance, especially for voice recordings recorded in varying acoustic tracks. The article also presents the results of the selection of a reference model representing an alternative hypothesis in the decision-making system, which significantly translates into an increase in the effectiveness of speaker verification. The final experiment presented is a test of the performance achieved in a varying acoustic environment during remote voice login to a web portal by the test group, as well as a final adjustment of the decision-making threshold.
引用
收藏
页数:19
相关论文
共 50 条
  • [1] On the Security of a Two-Factor Authentication Scheme
    Catuogno, Luigi
    Galdi, Clemente
    [J]. INFORMATION SECURITY THEORY AND PRACTICES: SECURITY AND PRIVACY OF PERVASIVE SYSTEMS AND SMART DEVICES, 2010, 6033 : 245 - +
  • [2] On the (In)Security of Mobile Two-Factor Authentication
    Dmitrienko, Alexandra
    Liebchen, Christopher
    Rossow, Christian
    Sadeghi, Ahmad-Reza
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 : 365 - 383
  • [3] Cryptocurrencies with Security Policies and Two-Factor Authentication
    Breuer, Florian
    Goyal, Vipul
    Malavolta, Giulio
    [J]. 2021 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2021), 2021, : 140 - 158
  • [4] BeamAuth: Two-Factor Web Authentication with a Bookmark
    Adida, Ben
    [J]. CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 48 - 57
  • [5] Advanced security of two-factor authentication system using stego QR code
    Kouraogo Y.
    Orhanou G.
    Elhajji S.
    [J]. International Journal of Information and Computer Security, 2020, 12 (04) : 436 - 449
  • [6] Two-factor authentication using biometric based quantum operations
    Sharma, Mohit Kr
    Nene, Manisha J.
    [J]. SECURITY AND PRIVACY, 2020, 3 (03)
  • [7] Enhancing Security of the Reduced-Operation Two-Factor Authentication by Using Ambient WiFi
    LIU Dong
    CHEN Jing
    DU Ruiying
    ZHANG Huanguo
    [J]. Chinese Journal of Electronics, 2018, 27 (03) : 625 - 633
  • [8] Enhancing Security of the Reduced-Operation Two-Factor Authentication by Using Ambient WiFi
    Liu Dong
    Chen Jing
    Du Ruiying
    Zhang Huanguo
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2018, 27 (03) : 625 - 633
  • [9] Highly reliable two-factor biometric authentication based on handwritten and voice passwords using flexible neural networks
    Sulavko, A. E.
    [J]. COMPUTER OPTICS, 2020, 44 (01) : 82 - 91
  • [10] Two-Factor Authentication with End-to-End Password Security
    Jarecki, Stanislaw
    Krawczyk, Hugo
    Shirvanian, Maliheh
    Saxena, Nitesh
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT II, 2018, 10770 : 431 - 461