SlideShare a Scribd company logo
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 4 Issue 4, June 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD31595 | Volume – 4 | Issue – 4 | May-June 2020 Page 1516
Authentication System Based on the
Combination of Voice Biometrics and OTP Generation
Tridib Mondal, Praveen Kumar Pandey
Department of MCA, Jain University, Bengaluru, Karnataka, India
ABSTRACT
Authentication is the process by which the identity of an individual isverified.
Voice authentication is the verification of identity based on the analysis of an
individual’s voice. Voice authentication has various advantages, but it is
seldom implemented due its shortcomings as compared to other forms of
biometric authentication. In this paper we have discussed abouttheapproach
for the implementation of voice authentication system through the
combination of OTP to increase its real world applicability and reduce its
shortcomings.
KEYWORDS: Authentication System, Voice Biometrics, OTP Generation
How to cite this paper: Tridib Mondal |
Praveen Kumar Pandey "Authentication
System Based on the Combination of
Voice Biometrics and OTP Generation"
Published in
International Journal
of Trend in Scientific
Research and
Development(ijtsrd),
ISSN: 2456-6470,
Volume-4 | Issue-4,
June 2020, pp.1516-
1517, URL:
www.ijtsrd.com/papers/ijtsrd31595.pdf
Copyright © 2020 by author(s) and
International Journal ofTrendinScientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the Creative
CommonsAttribution
License (CC BY 4.0)
(http://creativecommons.org/licenses/by
/4.0)
I. INTRODUCTION:
In recent times the most popular type of authentication is
password authentication, but with the increasing number of
attacks by hackers it becomes essential to set a strong
password. The strength of a password is equivalent to its
complexity, but due to increase in complexity, it becomes
very difficult to remember such passwords. So alternative
forms of authentication which usebiometricsareveryuseful
as the user does not have to remember anything to
authenticate his or her identity.
Biometric authentication such as fingerprints and iris
biometrics require very specialized equipment and are
therefore costly and difficult to implement whereas voice
authentication require minimal amount of equipment and
also very easy to implement. But voice authenticationcan be
broken with help of voice recordings which can obtained
fairly easily. So the purpose of this paper is to overcome the
shortcoming of voice authentication with OTP so that it is
resistant to attacks with recorded voice.
II. EXISTING SYSTEM
In voice authentication the first step is to input the audio
data into the system and convert it in to format in which it
can be processed. In this method we take the sound waves
which are one dimensional in nature and turn it in into
numbers by recording the height of the wave at equally
spaced points. This process is known as sampling. This
sampled data is stored into the system.
In the next step, the stored audio data is pre-processed so
that it easier for the neural network to recognize patterns in
it. This can be done in a variety of ways depending on neural
network used. The audio data is represented in various
formats for example it can be represented in the form of a
spectrogram, which is the visual representation of audio
data.
In the next step, we extract features from this pre-processed
audio data so that the neural network can analyze them and
recognize patterns from them. These patterns are used to
match and compare different types of audio data.
After the extraction of features, it is sent into the neural
network. A number of samples of theuser’svoiceisrecorded
and then sent into the neural network model to train it and
find similar patterns which is used to recognize the user’s
voice during voice authentication.
IJTSRD31595
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD31595 | Volume – 4 | Issue – 4 | May-June 2020 Page 1517
Although this type of voice authentication has various
advantages the main drawback from the security point of
view is that it cannot differentiate between a recorded voice
played from an audio voice and the actual user. The system
only recognizes feature patterns from the audio, which is
also present in audio played through audio devices. This is a
huge problem for an authenticationsystem,astheidentity of
the user, can be easily spoofed with the helpofa recording of
the user’s voice.
III. SOLUTION
Considering the drawback mentioned above, a possible
solution is the implementation OTP along with voice
authentication. In this method, first during the registration
process the user is requested to recite numbers from zero to
nine, one by one a number of times. This data, is recorded as
ten different inputs and then sent into the algorithm,totrain
it so that it can recognize the voice pattern of the user. After
the registration process is completed, the user can login
using his voice. In the login process, the user sends an
authentication request, after receiving this request the
program generates a random fourdigituniquecode,whichis
displayed on the screen. Then unique code or OTP is recited
by the user. When the OTP is recited by the user, it is taken
as input into the system. Each digit recited by the user is
input into the previously trained algorithm one by one, the
pattern of the voice is matched with the pattern of the user’s
voice. If the voice pattern of each of the digit matches with
the voice pattern of the user, the next step is initiated where
each digit is converted from speech to textformat,thistext is
the matched with the previously generated OTP. If the text
matches with the previously generated OTP, then the
authentication process is complete and the user is granted
access.
This implementation is a very effective solution because the
attacker cannot access the system witha pre-recordedaudio
as the voice passphrase changes every time. As each digit of
the passphrase, is converted intotextandcomparedwiththe
generated OTP, a previously recorded audio of the user will
have the same voice pattern but after it has been converted
to text it will not match currently generated OTP, thereby
preventing identity spoofing.
IV. REFERENCES
[1] Homayoon Beigi (2011), "Fundamentals of Speaker
Recognition", Springer-Verlag, Berlin,2011, ISBN 978-
0-387-77591-3.
[2] "Biometrics from the movies" –National Institute of
Standards and Technology
[3] Elisabeth Zetterholm (2003), Voice Imitation. A
Phonetic Study of Perceptual Illusions and Acoustic
Success, Phd thesis, Lund University.
[4] Md Sahidullah (2015), Enhancement of Speaker
Recognition Performance Using BlockLevel, Relativeand
Temporal Information of Subband Energies, PhD
thesis, Indian Institute of Technology Kharagpur.

More Related Content

PDF
IJSRED-V2I5P43
PDF
Voice Recognition System for Automobile Safety.
PDF
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
PDF
IRJET - Design of Student Security System using RFID Mechanism
PDF
IRJET- Technical Review of different Methods for Multi Factor Authentication
PDF
WLAN Penetration Examination of The University of Pembangunan Panca Budi
PDF
IRJET - Voice based E-Mail for Visually Impaired
PDF
IRJET- Deployment of Nanosat at Low Altitude for Atmospheric Parameter Analysis
IJSRED-V2I5P43
Voice Recognition System for Automobile Safety.
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET - Design of Student Security System using RFID Mechanism
IRJET- Technical Review of different Methods for Multi Factor Authentication
WLAN Penetration Examination of The University of Pembangunan Panca Budi
IRJET - Voice based E-Mail for Visually Impaired
IRJET- Deployment of Nanosat at Low Altitude for Atmospheric Parameter Analysis

What's hot (19)

PDF
IRJET- Email Framework for Blinds using Speech Recognition
PDF
IRJET - Lightweight ECC based RFID Authentication Protocol
PDF
Color Code PIN Authentication System Using Multi-TouchTechnology
PDF
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICES
PDF
IRJET- RFID Based Security Guard System using GSM
PDF
IRJET- Graphical user Authentication for an Alphanumeric OTP
PDF
IRJET- End to End Message Encryption using Biometrics
PDF
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
PDF
38 9145 it nfc secured offline password storage (edit lafi)
PDF
Anomaly Detection using String Analysis for Android Malware Detection - CISIS...
PPTX
Securing Mobile Cloud Using Fingerprint Authentication
PDF
A Review Study on Secure Authentication in Mobile System
PPTX
Use biometrics for identity management of cloud users to enhanced the securit...
PDF
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
PDF
User Authentication: Passwords and Beyond
PDF
Final thesis
PDF
Data Mining For Intrusion Detection in Mobile Systems
PDF
A secure communication in smart phones using two factor authentications
PDF
Effectiveness of various user authentication techniques
IRJET- Email Framework for Blinds using Speech Recognition
IRJET - Lightweight ECC based RFID Authentication Protocol
Color Code PIN Authentication System Using Multi-TouchTechnology
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICES
IRJET- RFID Based Security Guard System using GSM
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET- End to End Message Encryption using Biometrics
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
38 9145 it nfc secured offline password storage (edit lafi)
Anomaly Detection using String Analysis for Android Malware Detection - CISIS...
Securing Mobile Cloud Using Fingerprint Authentication
A Review Study on Secure Authentication in Mobile System
Use biometrics for identity management of cloud users to enhanced the securit...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
User Authentication: Passwords and Beyond
Final thesis
Data Mining For Intrusion Detection in Mobile Systems
A secure communication in smart phones using two factor authentications
Effectiveness of various user authentication techniques
Ad

Similar to Authentication System Based on the Combination of Voice Biometrics and OTP Generation (20)

PDF
Voice-based Login System
PPTX
Speaker recognition in android
PPTX
Speaker recognition in android
PPT
Voice recognition
PDF
C0210014017
PDF
Voice Biometric Identity Authentication Model for IoT Devices
PPT
VOICE BASED SECURITY SYSTEM
PPT
VOICE BASED SECURITY SYSTEM
PDF
Biometric System and Recognition Authentication and Security Issues
PDF
One time password generation using mathematical random function in sphere spa...
PDF
Story Voice authentication systems .pdf
PDF
Identity authentication using voice biometrics technique
PDF
An Enhanced Security System for Web Authentication
PPT
Biometric Presentation
PDF
Captiosus Voting System
PPTX
iris ppt for machine laernig and voting.pptx
PDF
NLP BASED INTERVIEW ASSESSMENT SYSTEM
PPTX
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
PDF
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
PPTX
Presentation Fingervein Authentication
Voice-based Login System
Speaker recognition in android
Speaker recognition in android
Voice recognition
C0210014017
Voice Biometric Identity Authentication Model for IoT Devices
VOICE BASED SECURITY SYSTEM
VOICE BASED SECURITY SYSTEM
Biometric System and Recognition Authentication and Security Issues
One time password generation using mathematical random function in sphere spa...
Story Voice authentication systems .pdf
Identity authentication using voice biometrics technique
An Enhanced Security System for Web Authentication
Biometric Presentation
Captiosus Voting System
iris ppt for machine laernig and voting.pptx
NLP BASED INTERVIEW ASSESSMENT SYSTEM
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
Presentation Fingervein Authentication
Ad

More from ijtsrd (20)

PDF
A Study of School Dropout in Rural Districts of Darjeeling and Its Causes
PDF
Pre extension Demonstration and Evaluation of Soybean Technologies in Fedis D...
PDF
Pre extension Demonstration and Evaluation of Potato Technologies in Selected...
PDF
Pre extension Demonstration and Evaluation of Animal Drawn Potato Digger in S...
PDF
Pre extension Demonstration and Evaluation of Drought Tolerant and Early Matu...
PDF
Pre extension Demonstration and Evaluation of Double Cropping Practice Legume...
PDF
Pre extension Demonstration and Evaluation of Common Bean Technology in Low L...
PDF
Enhancing Image Quality in Compression and Fading Channels A Wavelet Based Ap...
PDF
Manpower Training and Employee Performance in Mellienium Ltdawka, Anambra State
PDF
A Statistical Analysis on the Growth Rate of Selected Sectors of Nigerian Eco...
PDF
Automatic Accident Detection and Emergency Alert System using IoT
PDF
Corporate Social Responsibility Dimensions and Corporate Image of Selected Up...
PDF
The Role of Media in Tribal Health and Educational Progress of Odisha
PDF
Advancements and Future Trends in Advanced Quantum Algorithms A Prompt Scienc...
PDF
A Study on Seismic Analysis of High Rise Building with Mass Irregularities, T...
PDF
Descriptive Study to Assess the Knowledge of B.Sc. Interns Regarding Biomedic...
PDF
Performance of Grid Connected Solar PV Power Plant at Clear Sky Day
PDF
Vitiligo Treated Homoeopathically A Case Report
PDF
Vitiligo Treated Homoeopathically A Case Report
PDF
Uterine Fibroids Homoeopathic Perspectives
A Study of School Dropout in Rural Districts of Darjeeling and Its Causes
Pre extension Demonstration and Evaluation of Soybean Technologies in Fedis D...
Pre extension Demonstration and Evaluation of Potato Technologies in Selected...
Pre extension Demonstration and Evaluation of Animal Drawn Potato Digger in S...
Pre extension Demonstration and Evaluation of Drought Tolerant and Early Matu...
Pre extension Demonstration and Evaluation of Double Cropping Practice Legume...
Pre extension Demonstration and Evaluation of Common Bean Technology in Low L...
Enhancing Image Quality in Compression and Fading Channels A Wavelet Based Ap...
Manpower Training and Employee Performance in Mellienium Ltdawka, Anambra State
A Statistical Analysis on the Growth Rate of Selected Sectors of Nigerian Eco...
Automatic Accident Detection and Emergency Alert System using IoT
Corporate Social Responsibility Dimensions and Corporate Image of Selected Up...
The Role of Media in Tribal Health and Educational Progress of Odisha
Advancements and Future Trends in Advanced Quantum Algorithms A Prompt Scienc...
A Study on Seismic Analysis of High Rise Building with Mass Irregularities, T...
Descriptive Study to Assess the Knowledge of B.Sc. Interns Regarding Biomedic...
Performance of Grid Connected Solar PV Power Plant at Clear Sky Day
Vitiligo Treated Homoeopathically A Case Report
Vitiligo Treated Homoeopathically A Case Report
Uterine Fibroids Homoeopathic Perspectives

Recently uploaded (20)

PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
A systematic review of self-coping strategies used by university students to ...
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
Lesson notes of climatology university.
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PDF
01-Introduction-to-Information-Management.pdf
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Weekly quiz Compilation Jan -July 25.pdf
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
Cell Structure & Organelles in detailed.
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
Cell Types and Its function , kingdom of life
PPTX
Final Presentation General Medicine 03-08-2024.pptx
Module 4: Burden of Disease Tutorial Slides S2 2025
Abdominal Access Techniques with Prof. Dr. R K Mishra
Chinmaya Tiranga quiz Grand Finale.pdf
A systematic review of self-coping strategies used by university students to ...
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Microbial disease of the cardiovascular and lymphatic systems
Lesson notes of climatology university.
O5-L3 Freight Transport Ops (International) V1.pdf
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
01-Introduction-to-Information-Management.pdf
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Weekly quiz Compilation Jan -July 25.pdf
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
VCE English Exam - Section C Student Revision Booklet
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Cell Structure & Organelles in detailed.
Microbial diseases, their pathogenesis and prophylaxis
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Cell Types and Its function , kingdom of life
Final Presentation General Medicine 03-08-2024.pptx

Authentication System Based on the Combination of Voice Biometrics and OTP Generation

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 4 Issue 4, June 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD31595 | Volume – 4 | Issue – 4 | May-June 2020 Page 1516 Authentication System Based on the Combination of Voice Biometrics and OTP Generation Tridib Mondal, Praveen Kumar Pandey Department of MCA, Jain University, Bengaluru, Karnataka, India ABSTRACT Authentication is the process by which the identity of an individual isverified. Voice authentication is the verification of identity based on the analysis of an individual’s voice. Voice authentication has various advantages, but it is seldom implemented due its shortcomings as compared to other forms of biometric authentication. In this paper we have discussed abouttheapproach for the implementation of voice authentication system through the combination of OTP to increase its real world applicability and reduce its shortcomings. KEYWORDS: Authentication System, Voice Biometrics, OTP Generation How to cite this paper: Tridib Mondal | Praveen Kumar Pandey "Authentication System Based on the Combination of Voice Biometrics and OTP Generation" Published in International Journal of Trend in Scientific Research and Development(ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-4, June 2020, pp.1516- 1517, URL: www.ijtsrd.com/papers/ijtsrd31595.pdf Copyright © 2020 by author(s) and International Journal ofTrendinScientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative CommonsAttribution License (CC BY 4.0) (http://creativecommons.org/licenses/by /4.0) I. INTRODUCTION: In recent times the most popular type of authentication is password authentication, but with the increasing number of attacks by hackers it becomes essential to set a strong password. The strength of a password is equivalent to its complexity, but due to increase in complexity, it becomes very difficult to remember such passwords. So alternative forms of authentication which usebiometricsareveryuseful as the user does not have to remember anything to authenticate his or her identity. Biometric authentication such as fingerprints and iris biometrics require very specialized equipment and are therefore costly and difficult to implement whereas voice authentication require minimal amount of equipment and also very easy to implement. But voice authenticationcan be broken with help of voice recordings which can obtained fairly easily. So the purpose of this paper is to overcome the shortcoming of voice authentication with OTP so that it is resistant to attacks with recorded voice. II. EXISTING SYSTEM In voice authentication the first step is to input the audio data into the system and convert it in to format in which it can be processed. In this method we take the sound waves which are one dimensional in nature and turn it in into numbers by recording the height of the wave at equally spaced points. This process is known as sampling. This sampled data is stored into the system. In the next step, the stored audio data is pre-processed so that it easier for the neural network to recognize patterns in it. This can be done in a variety of ways depending on neural network used. The audio data is represented in various formats for example it can be represented in the form of a spectrogram, which is the visual representation of audio data. In the next step, we extract features from this pre-processed audio data so that the neural network can analyze them and recognize patterns from them. These patterns are used to match and compare different types of audio data. After the extraction of features, it is sent into the neural network. A number of samples of theuser’svoiceisrecorded and then sent into the neural network model to train it and find similar patterns which is used to recognize the user’s voice during voice authentication. IJTSRD31595
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD31595 | Volume – 4 | Issue – 4 | May-June 2020 Page 1517 Although this type of voice authentication has various advantages the main drawback from the security point of view is that it cannot differentiate between a recorded voice played from an audio voice and the actual user. The system only recognizes feature patterns from the audio, which is also present in audio played through audio devices. This is a huge problem for an authenticationsystem,astheidentity of the user, can be easily spoofed with the helpofa recording of the user’s voice. III. SOLUTION Considering the drawback mentioned above, a possible solution is the implementation OTP along with voice authentication. In this method, first during the registration process the user is requested to recite numbers from zero to nine, one by one a number of times. This data, is recorded as ten different inputs and then sent into the algorithm,totrain it so that it can recognize the voice pattern of the user. After the registration process is completed, the user can login using his voice. In the login process, the user sends an authentication request, after receiving this request the program generates a random fourdigituniquecode,whichis displayed on the screen. Then unique code or OTP is recited by the user. When the OTP is recited by the user, it is taken as input into the system. Each digit recited by the user is input into the previously trained algorithm one by one, the pattern of the voice is matched with the pattern of the user’s voice. If the voice pattern of each of the digit matches with the voice pattern of the user, the next step is initiated where each digit is converted from speech to textformat,thistext is the matched with the previously generated OTP. If the text matches with the previously generated OTP, then the authentication process is complete and the user is granted access. This implementation is a very effective solution because the attacker cannot access the system witha pre-recordedaudio as the voice passphrase changes every time. As each digit of the passphrase, is converted intotextandcomparedwiththe generated OTP, a previously recorded audio of the user will have the same voice pattern but after it has been converted to text it will not match currently generated OTP, thereby preventing identity spoofing. IV. REFERENCES [1] Homayoon Beigi (2011), "Fundamentals of Speaker Recognition", Springer-Verlag, Berlin,2011, ISBN 978- 0-387-77591-3. [2] "Biometrics from the movies" –National Institute of Standards and Technology [3] Elisabeth Zetterholm (2003), Voice Imitation. A Phonetic Study of Perceptual Illusions and Acoustic Success, Phd thesis, Lund University. [4] Md Sahidullah (2015), Enhancement of Speaker Recognition Performance Using BlockLevel, Relativeand Temporal Information of Subband Energies, PhD thesis, Indian Institute of Technology Kharagpur.