[go: up one dir, main page]

CA2465650A1 - Method for preventing user identity spoofing or impersonation in voice biometric authentication systems - Google Patents

Method for preventing user identity spoofing or impersonation in voice biometric authentication systems Download PDF

Info

Publication number
CA2465650A1
CA2465650A1 CA 2465650 CA2465650A CA2465650A1 CA 2465650 A1 CA2465650 A1 CA 2465650A1 CA 2465650 CA2465650 CA 2465650 CA 2465650 A CA2465650 A CA 2465650A CA 2465650 A1 CA2465650 A1 CA 2465650A1
Authority
CA
Canada
Prior art keywords
voice
biometric authentication
identifier
authentication system
determining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA 2465650
Other languages
French (fr)
Inventor
James Craig
Andrew Osburn
Jeremy Bernard
Mark Boyle
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Diaphonics Inc
Original Assignee
Diaphonics Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Diaphonics Inc filed Critical Diaphonics Inc
Priority to CA 2465650 priority Critical patent/CA2465650A1/en
Publication of CA2465650A1 publication Critical patent/CA2465650A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification techniques
    • G10L17/06Decision making techniques; Pattern matching strategies
    • G10L17/08Use of distortion metrics or a particular distance between probe pattern and reference templates

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Game Theory and Decision Science (AREA)
  • Health & Medical Sciences (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • Acoustics & Sound (AREA)
  • Multimedia (AREA)
  • Collating Specific Patterns (AREA)

Abstract

A method and a system for preventing identity spoofing of a voice biometric authentication system by analyzing frequency domain spectrum of a first audio sample, calculating a first unique identifier and storing the first unique identifier on the system. After receiving a second audio sample, a second unique identifier is generated and compared to the first stored unique identifier. The authenticity of the second audio sample is determined.

Description

IVlethod for Preventing User Identity Spoofing or Impersonation in !/nice Biometric Authentication Systems FIELD OF INVENTION
s [0001] The present invention relates to voice biometric authentication. In particular, the present invention relates to method and system for preventing user identity spoofing in a voice biometric authentication system.
BACKGROUND OF THE INVENTION
[0002] The biometric characteristics of an individuals voice are as unique to ~o an individual as a fingerprint or retinal pattern. Sound waves generated by our vocal organs, for practical purposes, have enough repetitions to be regarded as periodic. In 19t" century, Fourier showed that any non-sinusoidal wave, no matter how complicated, can be represented as the sum of a number of sinusoidal waves of different frequencies, amplitudes and phases.
~s The spectrum of the speech wave specifies the amplitudes, frequencies and phases of the wave's sinusoidal components. The sum of many sinusoidal waves can result in a wave with a non-sinusoidal shape with the basic pattern of the non-sinusoidal wave repeating with the sarne periodicity as the lowest frequency component of all components added. Phase-change can also alter 2o the wave shape of the resulting wave. Therefore, a variety of wave shapes can be represented by adding sinusoidal components of the same amplitudes and frequencies, but of different phases. However, our hearing mechanism cannot always detect the effect of such changes. Non-sinusoidal waves, consisting of sinusoidal waves with the same amplitudes and frequencies, 2s often sound the same, even if their wave shapes differ because of differences in the phase relationship of their components. For this reason, in considering frequency domain spectrum, only the "°amplitude'° of the non-sinusoidal wave considered, and not the °°phase°' spectrum. The amplitude spectrum specifies just the frequencies and amplitudes of the sinusoidal components [0003] By regarding the sound waves as the sum of a number of waves with simple, sinusoidal shapes, we can derive that each of the sound waves will have a unique frequency domain spectrum with a unique identifier.
[0004] US Patent 6, 488,800 describes a speaker verification system using s the voice of a user uttering a continuous, random length digit string is provided. The speaker verification system includes a random digit generator for generating a continuous, random length digit string; a user interface for providing the continuous, random length digit string; a feature extractor for extracting voice features from the user°s voice uttering the continuous, to random length digit string; a digit voice verification unit for comparing the voice features with items in a speaker-independent continuous digit voice model to derive a digit string corresponding to items in the speaker-independent continuous digifi voice model, which match the voice features, and for determining whether the derived digit string is identical to the digit is string provided to the user via the user interface; and a speaker verification unit for comparing the voice features with a speaker-dependent model of the user to measure the similarity between them.
[0005] Extraction of characteristic frequency and intensity features from frequency domain digital representation has been described in Canadian 2o Patent Application no. 2,364,293, which is filed in the name of the applicant as in the present application. Canadian Patent Application no. 2,375,415, which is also filed in the name of the applicant of the present application, describes a voice transaction fraud detection method and system which includes means to assess the emotion of the user based upon analysis of 2s voice characteristics.
[0006] As with all security systems, there will be fraudsters who will attempt to breach or fool the system. One such method for attempting this type of security breach is to fraudulently claim another users identity and then attempt to gain access through impersonation. This method is called identity 3o spoofing.
[0007] A number of methods have been developed to prevent the identity spoofing in a voice biometric system. However, there were disadvantages with the existing method: in the case where a poor quality recording is made, such as with an analog recording device, the voice verification system can fail s to verify the fraudster as the recording will not produce a voice print of sufficient fidelity to match the original voice print; in the case of text dependant voice verification systems, manipulating the recorded audio file to subtly change the audio data can easily fool this 1-to-1-file comparison.
SUMMARY OF THE INVENTION
to [0008] The present invention relates to method and system for preventing user identity spoofing in a voice biometric authentication system.
[0009] According to one aspect of the present invention there is provided a method for preventing user identity spoofing in a voice biometric authentication system comprising the steps of: determining a first unique is characteristic identifier of a first voice; storing the first identifier in a database;
determining a second unique characteristic identifier of a second voice; and comparing the second identifier with the first identifier to determine the identity of the second voice.
[0010] According to another aspect of the present invention there is provided 2o a voice biometric authentication system comprising: receiver for receiving voices; means for determining a first unique characteristic identifier of a first voice; a database for storing the first identifier; means for determining a second unique characteristic identifier of a second voice; and means for comparing the second identifier with the first identifier to determine the zs identity of the second voice.
[0011 ] According to yet another aspect of the present invention there is provided a computer program product, comprising: a memory for having computer-readable code embodied therein for authenticating voice biometric comprising: code means for determining a first unique characteristic identifier _3_ of a first voice; code means for storing the first identifier in a database;
code means for determining a second unique characteristic identifier of a second voice; and code means for comparing the second identifier with the first identifier to determine the identity of the second voice.
s [0012] It is an object of the invention to provide a novel method and system for preventing user identity spoofing or impersonation in voice biometric authentication systems.
[0013] One of the advantages of the present invention is that it prevents users from spoofing or impersonating other users..
to [0014] The invention can operate with text dependent and independent voice biometric systems; and with voice biometric verification and identification systems; and automatically detects attempts of identity spoofing of voice biometric systems.
[0015] The invention further operates in real-time to detect user identity Is spoofing attempts to prevent fraudulent access. The invention can identify attempts to conduct identity spoofing with copied digital audio files, even when the audio data has been partially manipulated to inject noise or other spurious data.
[0016] This summary of the invention does not necessarily describe all 2o features of the invention.
BRIEF DESCRIPTION OF THE DRAWINGS
[0017] These and other features of the invention will become more apparent from the following description in which reference is made to the appended drawings wherein:
2s [0018] FIGURE 1 shows a flow chart of steps to acquire a unique identifier in accordance with an embodiment of the present invention; and [0019] FIGURE 2 shows a flow chart of a method and system for preventing user identity spoofing in a voice biometric authentication system.

[0020] Voice biometric authentication systems usually operate in the following manner:
~ The user enrols in the system by providing voice responses to several s queries. The user utterances are used to form a unique voice print for the user;
~ Successively, a user accesses the system and provides a voice sample for verification of identity; and ~ The system compares the new voice sample print against the original to stored from the enrolment process in order to determine if the user is indeed who they claim to be.
[0021 ] This invention relates to a method and a system for preventing a fraudster to attempt to spoof, or to impersonate other legitimate users, in voice biometric based voice verification and identification systems. These is systems are typically used in government, financial, and security applications in order to control user access to computer networks, telephony applications, and/or buildings/restricted access areas. Automated, computer based systems have been developed and used, to allow authentication of an individuals identity based upon a sample of speech.
20 [0022] There are several classifications of the systems used to authenticate identity based upon voice biometrics: First, systems can either perform speaker verification or speaker identification. in speaker verification the user claims an identity that must be verified as true or false. In speaker identification the user provides a speech sample and then one must choose 2s which speaker within a closed set matches the user sample. Each of the two systems, speaker verification and speaker identification, can also be either text dependant or text independent. Text dependent systems use a known utterance, for example a password or combination digit sequence, which is predefined for each speaker. Text independent systems use a different -s-response for each identification attempt. In this case, the input could be a random response to a question.
[0023) Fraudster attempts to impersonate a valid user through identity spoofiing, for example, by attempting to surreptitiously record a valid user s speaking their utterances and then attempt to access the system by using the recorded utterances. The fraudster attempts to spoof the system by claiming the identity of a valid user and then playing the recorded utterances for the valid user when prompted by the voice biometric system.
[0024] As shown in Figure 1 and 2, this invention solves this problem of to identity spoofing for voice verification and identification based biometric systems. The invention allows the voice verification and identification based biometric system to identify user utterances that are recordings of previous utterances and are therefore being employed to spoof the voice biometric access system.
is [0025) The invention involves the employment of methods to derive a unique signature or representation of a recorded voice utterance from a user, preferably a digital signal processing method.
[0026) Referring to Figure 1, each time a user interacts with the voice biometric system and provides an utterance either for enrollment or for 2o verification, a unique characteristic identifier for the utterance is derived through signal processing methods by analyzing the frequency domain spectrum. This unique characteristic identifier is then stored with the utterance in the voice biometric system database.
[0027] Referring to Figure 2, a user provides an audio sample, which is 2s received by the voice authentication system. A second unique identifier is generated for this audio sample by analyzing the frequency domain spectrum.
This second identifier is compared to the first identifier which is stored in a database to determine whether there is a match or not.

[0028] It should be apparent to a person skilled in the art that the method and system described in Figure 2 can be used both for the user verification or user identification, and can be either text dependant or text independent.
[0029] The analysis of the frequency domain spectrum and the calculation of s the unique identifier can be performed, for example by a microprocessor, a digital signal processor or any other means known to those skilled in the art.
[0030] The invention can operate with text dependent and independent voice biometric systems; and with voice biometric verification and identification systems; and automatically detects attempts of identity spoofing of voice to biometric systems.
[0031 ] The invention further operates in real-time to detect user identity spoofing attempts to prevent fraudulent access. The invention can identify attempts to conduct identity spoofing with copied digital audio files, even when the audio data has been partially manipulated to inject noise or other ~ s spurious data.
[0032] The present invention has been described with regard to one or more embodiments. However, it will be apparent to persons skilled in the art that a number of variations and modifications can be made without departing from the scope of the invention as defined in the claims.
_7_

Claims (20)

1) A method for preventing user identity spoofing in a voice biometric authentication system comprising the steps of:

determining a first unique characteristic identifier of a first voice;

storing the first identifier in a database;

determining a second unique characteristic identifier of a second voice; and comparing the second identifier with the first identifier to determine the identity of the second voice.
2) The method according to claim 1, wherein the determining step further comprises calculating of a frequency domain spectrum.
3) The method according to claim 1, wherein the determining step further comprises digital signal processing.
4) The method according to claim 1, further comprising the step of recording the first voice.
5) The method according to claim 1, wherein the first voice is a text independent utterance.
6) The method according to claim 1, wherein the first voice is derived from a reading of a predetermined text.
7) The method according to claim 1, wherein the second voice is a text independent utterance.
8) The method according to claim 1, wherein the voice biometric authentication system is a verification system.
9) The method according to claim 1, wherein the voice biometric authentication system is an identification system.
10) A voice biometric authentication system comprising:

receiver for receiving voices;

means for determining a first unique characteristic identifier of a first voice;

a database for storing the first identifier;

means for determining a second unique characteristic identifier of a second voice; and means for comparing the second identifier with the first identifier to determine the identity of the second voice.
11) The voice biometric authentication system according to claim 10, wherein the determining means is a digital signal processor.
12) The voice biometric authentication system according to claim 10, wherein the comparing means is a microprocessor.
13) The voice biometric authentication system according to claim 10, wherein the comparing means is a digital signal processor.
14) The voice biometric authentication system according to claim 10, wherein the first voice is a text independent utterance.
15) The voice biometric authentication system according to claim 10, wherein the first voice is derived from a reading of a predetermined text.
16) The voice biometric authentication system according to claim 10, wherein the second voice is a text independent utterance.
17) The voice biometric authentication system according to claim 10, wherein the voice biometric authentication system is a verification system.
18) The voice biometric authentication system according to claim 10, wherein the voice biometric authentication system is an identification system.
19) A computer program product, comprising:

a memory for having computer-readable code embodied therein for authenticating voice biometric comprising:

code means for determining a first unique characteristic identifier of a first voice;

code means for storing the first identifier in a database;

code means for determining a second unique characteristic identifier of a second voice; and code means for comparing the second identifier with the first identifier to determine the identity of the second voice.
20) The computer program product according to claim 19, wherein the determining code means further comprises code means for calculating a frequency domain spectrum.
CA 2465650 2004-04-30 2004-04-30 Method for preventing user identity spoofing or impersonation in voice biometric authentication systems Abandoned CA2465650A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CA 2465650 CA2465650A1 (en) 2004-04-30 2004-04-30 Method for preventing user identity spoofing or impersonation in voice biometric authentication systems

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CA 2465650 CA2465650A1 (en) 2004-04-30 2004-04-30 Method for preventing user identity spoofing or impersonation in voice biometric authentication systems

Publications (1)

Publication Number Publication Date
CA2465650A1 true CA2465650A1 (en) 2005-10-30

Family

ID=35415037

Family Applications (1)

Application Number Title Priority Date Filing Date
CA 2465650 Abandoned CA2465650A1 (en) 2004-04-30 2004-04-30 Method for preventing user identity spoofing or impersonation in voice biometric authentication systems

Country Status (1)

Country Link
CA (1) CA2465650A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2465436A (en) * 2008-11-25 2010-05-26 Inst Information Industry Apparatus and method for generating and verifying a voice signature of a message using pronounceable symbols

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2465436A (en) * 2008-11-25 2010-05-26 Inst Information Industry Apparatus and method for generating and verifying a voice signature of a message using pronounceable symbols
GB2465436B (en) * 2008-11-25 2011-06-29 Inst Information Industry apparatus and method for generating and verifying a voice signature of a message and computer readable medium thereof

Similar Documents

Publication Publication Date Title
Gałka et al. Playback attack detection for text-dependent speaker verification over telephone channels
US6510415B1 (en) Voice authentication method and system utilizing same
US6480825B1 (en) System and method for detecting a recorded voice
US6084967A (en) Radio telecommunication device and method of authenticating a user with a voice authentication token
EP2364495B1 (en) Method for verifying the identify of a speaker and related computer readable medium and computer
US8139723B2 (en) Voice authentication system and method using a removable voice ID card
US20180146370A1 (en) Method and apparatus for secured authentication using voice biometrics and watermarking
US7054811B2 (en) Method and system for verifying and enabling user access based on voice parameters
US20080270132A1 (en) Method and system to improve speaker verification accuracy by detecting repeat imposters
US20150112682A1 (en) Method for verifying the identity of a speaker and related computer readable medium and computer
WO2010047816A1 (en) Speaker verification methods and apparatus
WO2010047817A1 (en) Speaker verification methods and systems
GB2541466A (en) Replay attack detection
CN101197131A (en) Random voiceprint password verification system, random voiceprint password lock and generation method thereof
KR20010009081A (en) Speaker verification system using continuous digits with flexible figures and method thereof
Firc et al. The dawn of a text-dependent society: deepfakes as a threat to speech verification systems
BR102014023647A2 (en) method and system for fraud detection in voice processing based applications
CA2465650A1 (en) Method for preventing user identity spoofing or impersonation in voice biometric authentication systems
Aloufi et al. On-Device Voice Authentication with Paralinguistic Privacy
RU2747935C2 (en) Method and system for user authentication using voice biometrics
Chadha et al. Text-independent speaker recognition for low SNR environments with encryption
Yang Security in voice authentication
Marzotti et al. Biometric authentication using voice
Kounoudes et al. Intelligent Speaker Verification based Biometric System for Electronic Commerce Applications
CN119341799A (en) A method for retrieving passwords through intelligent voiceprints

Legal Events

Date Code Title Description
FZDE Dead