Voice Biometrics

Author(s):  
Saleema A. ◽  
Sabu M. Thampi

Biometric technology is spearheading the existing authentication methods in the IoT. Considering the balance between security and convenience, voice biometrics seems to be the most logical biometric technologies to be used. The authors present an extensive survey to identify, analyze, and compare various methods and algorithms for the different phases in the process of speaker identification/recognition, which is the part and parcel in voice biometrics. The chapter is intended to provide essential background information to those interested in learning or planning to design voice authentication systems. The chapter highlights the need for a biometric authentication system, the reason why we prefer voice, its present state of affairs, and its scope with fog computing to be used in IoT.

Author(s):  
Z.-M. Zadorozhnyy ◽  
V. Muravskyi ◽  
S. Yatsyshyn ◽  
O. Shevchuk

Abstract. Modern conditions of growing cyber threats caused by the hybrid conflicts around the world and looming biological threat of the COVID-19 pandemic necessitate the introduction of biometric authentication of employees, leading to the transformation in the methodology and organization of accounting at enterprises. The procedure for accounting and control of time worked and wages of the employees is the first to undergo changes due to the forcibly limited access of employees to the enterprise data and premises, which determines the topicality and aims of this research. The aim of the article is to investigate the prospects for monitoring the working time and movement of employees on the premises (facilities) of the enterprise with the use of biometric technology in order to develop the methodology of automation of the accounting of payments made to employees and to ensure the cybersecurity of economic entities. The prospects of using an automated employee checkpoint system based on biometrics for the purposes of accounting and control are explored. The paper improves the methodology of accounting and control over the working time and wages of employees based on the automated employee authentication system using data on the time spent on premises and performance of job functions. Recommendations are made on ensuring biological and cyber security of enterprises in terms of categorizing the enterprise premises and equipment according to their functions and level of access to information and material flows. The research examines the prospects of accounting for the employee costs, as well as accurate distribution of overhead and other costs based on data of the biometric employee authentication system. It is advised to conduct further research into the peculiarities of methodology and organization of accounting under conditions of distance and isolated job performance by accounting employees, as it raises the requirements to cybersecurity of enterprises. Keywords: accounting, working time, wages (salary), biometrics, employee authentication, automation of accounting and control, cybersecurity, COVID-19. JEL Classification M41, M49 Formulas: 0; fig.: 2; tabl.: 1; bibl.: 18.


2019 ◽  
Vol 8 (08) ◽  
pp. 24805-24813
Author(s):  
Ibebuogu Chinwe C ◽  
Philip Seth ◽  
Anyaduba Obiageli J

This seminar paper deals with biometric authentication, using human facial geometry as the login verification parameter. Biometric is the measurement and statistical analysis of human's unique physical and behavioral characteristics by mapping face geometry, fingerprints, iris, and voice. The aim of this seminar paper is to develop a functional Biometric Authentication System Using Face Geometry as the authentication method. Facial Geometry Authentication is a category of biometric technology that maps an individual's facial features mathematically and stores the data as face-prints in a database. Meanwhile the objective of this paper is to improve data access security, enhance identification accuracy, and contribute to the improvement of the existing facial recognition systems, focusing mainly on increasing its accuracy performance. On the other hand, hacking into users’ privacy, loss of confidential information, and high running costs, among others geared the motivation to develop a biometric authentication system using face geometry. Furthermore, the software engineering methodology adopted in this seminar paper is the Structural System Analysis and Design Methodology (SSADM). The software is developed in Visual C-sharp, and the database in SQL Server 2012; using Microsoft Visual Studio 2012 as the integrated development environment. Besides, OpenCV 2.4.8 library is used for image processing, image mapping, and computer vision.  The expected result of this seminar paper include: improved user data security, and increased efficiency in facial detection/recognition.


2020 ◽  
Vol 28 (4) ◽  
pp. 657-676
Author(s):  
Constance Gikonyo

Criminal forfeiture is an asset confiscation mechanism used to seize benefits gained from an offence that one is convicted of. In Kenya, the Proceeds of Crime and Anti-Money Laundering Act provides the facilitating legislation. The present state of the regime's underutilisation prompts an examination of the substantive law and procedure provided in this statute. The analysis indicates that the provisions are technical in nature and the process is systematic. This ensures that a procedurally and substantively fair process is undertaken, in keeping with constitutional provisions. Nonetheless, identified challenges, including the complex nature of the provisions, translate to unclear interpretation and consequently ineffective implementation. This state of affairs is reversible through increased understanding of the criminal forfeiture provisions and their operation. This can potentially lead to an upsurge in its use and facilitate depriving offenders of criminal gains, removing the incentive for crime and reducing proceeds available to fund criminal activities.


2021 ◽  
Author(s):  
Fatin Atiqah Rosli ◽  
Saidatul Ardeenawatie Awang ◽  
Azian Azamimi Abdullah ◽  
Mohammad Shahril Salim

2021 ◽  
Vol 17 (1) ◽  
pp. 287-292
Author(s):  
Adriana-Meda UDROIU ◽  
Ștefan-Antonio DAN-ȘUTEU

Abstract: We introduce the term usable security to refer to security systems, models, mechanisms and applications that have as the main goal usability. Secure systems cannot exist without secure authentication methods. Thus we outline biometric authentication methods and we focus on iris recognition because is the most reliable and accurate method for human identification]. The most important advantage of iris biometric over other biometrics is that irises have enormous pattern variability meaning that the variation between individual is almost maximum and variation for any person across time or conditions is minimum. Taking into consideration this observations, this survey covers researches in this field, methods of technical implementation and the usability of this method as an authentication system on iOS environment.


Sign in / Sign up

Export Citation Format

Share Document