| Peer-Reviewed

Bio-metric Encryption of Data Using Voice Recognition

Received: 27 June 2021    Accepted: 19 July 2021    Published: 19 August 2021
Views:       Downloads:
Abstract

In symmetric cryptosystems, the protection of secret keys is based on the traditional user authentication and likewise the security of the cryptosystem depends on the secrecy of the secret keys. In the event of lost, theft or infection of these secrete keys; the security of the cryptosystems would be compromised hence exposing critical information. Biometrics has been commercially used to verify user’s identity. Voice biometrics has been proven to be even more effective because it cannot be stolen in some cases like face, fingerprint or even iris biometrics. The research proves that a well-designed system will prompt an authentication question and on verification user must provide both the desired answer as well as desired matching threshold or the system ignores the user features. This research proposes a software-based architecture solution for Biometric Encryption of data using Voice Recognition that employed the Dynamic Time Warping (DTW) technique to solve the problem of speech biometric duration varying with non-linear expansion and contraction. The approach then used database to store the monolithically bind cryptographic key with the equivalent biometric hardened template of the user in such manner that identity of the key will stay hidden unless there is a successful biometric authentication by intended party. The research used the MIT mobile device speaker verification corpus (MDB) and A data set in quiet environment (QDB) for training and verifying session. Finally using the Equal Error Rate (EER) the research evaluated performance or rate at which False Acceptance Rate (FAR) and a False Rejection Rate (FRR) are equal. Therefore, according to the result it offers a better substitute method of user authentication than traditional pre-shared keys for benefit of protecting secret keys.

Published in Automation, Control and Intelligent Systems (Volume 9, Issue 3)
DOI 10.11648/j.acis.20210903.12
Page(s) 89-96
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2024. Published by Science Publishing Group

Keywords

Biometrics, Encryption, Decryption, Authentication, Device Pairing, Voice Recognition, Audio, Bioscrypts

References
[1] Cavoukian, Ann, and Alex Stoianov. Biometric encryption: A positive-sum technology that achieves strong authentication, security and privacy. Information and Privacy Commissioner, Ontario, 2007.
[2] Soutar, Colin, Danny Roberge, Alex Stoianov, Rene Gilroy, and BVK Vijaya Kumar. "Biometric Encryption™."
[3] J. R. Deller, Jr., J. H. L. Hansen, and J. G. Proakis. Discrete-Time Processing of Speech Signals. Macmil- land Pub. Co., New York, 1993.
[4] Chandra, Sayani, et al. "Generate an Encryption Key by using Biometric Cryptosystems to secure transferring of Data over a Network."
[5] S. Furui. Digital Speech Processing, Synthesis and Recognition. Marcel Dekker, Inc., New York, 2001.
[6] F. Hao, R. Anderson, and J. Daugman. Combining cryptography with biometrics effectively. IEEE Transactions on Computer, 55 (9): 1081-1088, September 2006.
[7] A. K. Jain, K. Nandakumar, and A. Nagar. Bio- metric template security. EURASIP Journal on Ad- vances in Signal Processing Special Issue on Biomet- rics, January 2008.
[8] A. Juels and M. Sudan. A fuzzy commitment scheme. In Proceeding of the 6th ACM Conference on Computer and Communication Security, pages 28-36, November, 1999.
[9] T. Kinnunen. Spectral Features for Automatic Text Independent Speaker Recognition. PhD thesis, Department of Computer Science, University of Joensuu, Findland December 2003.
[10] Monrose, Fabian, et al. "Cryptographic key generation from voice." Security and Privacy, 2001. S&P 2001. Proceedings. 2001 IEEE Symposium on. IEEE, 2001.
[11] Venkatachalam, S. P., P. Muthu Kannan, and V. Palanisamy. "Combining cryptography with biometrics for enhanced security." Control, Automation, Communication and Energy Conservation, 2009. INCACEC 2009. 2009 International Conference on. IEEE, 2009.
[12] F. Monrose, M. K. Reiter, Q. Li, D. Lopresti, and C. Shih. Towards speech-generated cryptographic keys on resource constrained devices (extended abstract). In Proceedings of the 11th USENIX Security Symposium, August 2002.
[13] Inthavisas, K., and N. Sungprasert. "Cryptographic Key Regeneration from Speech." Proceedings of the World Congress on Engineering. Vol. 2. 2013.
[14] Carrara, Brent, and Carlisle Adams. "You are the key: generating cryptographic keys from voice biometrics." Privacy Security and Trust (PST), 2010 Eighth Annual International Conference on. IEEE, 2010.
[15] R. H. Woo, A. Park, and T. J. Hazen. The MIT mobile device speaker verification corpus: data col- lection and preliminary experiments. In Proceedings of Odssey, The Speaker and Language Recognition Workshop, San Juan, Puerto Rico, June 2006.
Cite This Article
  • APA Style

    Alhassan Jamilu Ibrahim, Usman Abubakar Jauro. (2021). Bio-metric Encryption of Data Using Voice Recognition. Automation, Control and Intelligent Systems, 9(3), 89-96. https://doi.org/10.11648/j.acis.20210903.12

    Copy | Download

    ACS Style

    Alhassan Jamilu Ibrahim; Usman Abubakar Jauro. Bio-metric Encryption of Data Using Voice Recognition. Autom. Control Intell. Syst. 2021, 9(3), 89-96. doi: 10.11648/j.acis.20210903.12

    Copy | Download

    AMA Style

    Alhassan Jamilu Ibrahim, Usman Abubakar Jauro. Bio-metric Encryption of Data Using Voice Recognition. Autom Control Intell Syst. 2021;9(3):89-96. doi: 10.11648/j.acis.20210903.12

    Copy | Download

  • @article{10.11648/j.acis.20210903.12,
      author = {Alhassan Jamilu Ibrahim and Usman Abubakar Jauro},
      title = {Bio-metric Encryption of Data Using Voice Recognition},
      journal = {Automation, Control and Intelligent Systems},
      volume = {9},
      number = {3},
      pages = {89-96},
      doi = {10.11648/j.acis.20210903.12},
      url = {https://doi.org/10.11648/j.acis.20210903.12},
      eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.acis.20210903.12},
      abstract = {In symmetric cryptosystems, the protection of secret keys is based on the traditional user authentication and likewise the security of the cryptosystem depends on the secrecy of the secret keys. In the event of lost, theft or infection of these secrete keys; the security of the cryptosystems would be compromised hence exposing critical information. Biometrics has been commercially used to verify user’s identity. Voice biometrics has been proven to be even more effective because it cannot be stolen in some cases like face, fingerprint or even iris biometrics. The research proves that a well-designed system will prompt an authentication question and on verification user must provide both the desired answer as well as desired matching threshold or the system ignores the user features. This research proposes a software-based architecture solution for Biometric Encryption of data using Voice Recognition that employed the Dynamic Time Warping (DTW) technique to solve the problem of speech biometric duration varying with non-linear expansion and contraction. The approach then used database to store the monolithically bind cryptographic key with the equivalent biometric hardened template of the user in such manner that identity of the key will stay hidden unless there is a successful biometric authentication by intended party. The research used the MIT mobile device speaker verification corpus (MDB) and A data set in quiet environment (QDB) for training and verifying session. Finally using the Equal Error Rate (EER) the research evaluated performance or rate at which False Acceptance Rate (FAR) and a False Rejection Rate (FRR) are equal. Therefore, according to the result it offers a better substitute method of user authentication than traditional pre-shared keys for benefit of protecting secret keys.},
     year = {2021}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Bio-metric Encryption of Data Using Voice Recognition
    AU  - Alhassan Jamilu Ibrahim
    AU  - Usman Abubakar Jauro
    Y1  - 2021/08/19
    PY  - 2021
    N1  - https://doi.org/10.11648/j.acis.20210903.12
    DO  - 10.11648/j.acis.20210903.12
    T2  - Automation, Control and Intelligent Systems
    JF  - Automation, Control and Intelligent Systems
    JO  - Automation, Control and Intelligent Systems
    SP  - 89
    EP  - 96
    PB  - Science Publishing Group
    SN  - 2328-5591
    UR  - https://doi.org/10.11648/j.acis.20210903.12
    AB  - In symmetric cryptosystems, the protection of secret keys is based on the traditional user authentication and likewise the security of the cryptosystem depends on the secrecy of the secret keys. In the event of lost, theft or infection of these secrete keys; the security of the cryptosystems would be compromised hence exposing critical information. Biometrics has been commercially used to verify user’s identity. Voice biometrics has been proven to be even more effective because it cannot be stolen in some cases like face, fingerprint or even iris biometrics. The research proves that a well-designed system will prompt an authentication question and on verification user must provide both the desired answer as well as desired matching threshold or the system ignores the user features. This research proposes a software-based architecture solution for Biometric Encryption of data using Voice Recognition that employed the Dynamic Time Warping (DTW) technique to solve the problem of speech biometric duration varying with non-linear expansion and contraction. The approach then used database to store the monolithically bind cryptographic key with the equivalent biometric hardened template of the user in such manner that identity of the key will stay hidden unless there is a successful biometric authentication by intended party. The research used the MIT mobile device speaker verification corpus (MDB) and A data set in quiet environment (QDB) for training and verifying session. Finally using the Equal Error Rate (EER) the research evaluated performance or rate at which False Acceptance Rate (FAR) and a False Rejection Rate (FRR) are equal. Therefore, according to the result it offers a better substitute method of user authentication than traditional pre-shared keys for benefit of protecting secret keys.
    VL  - 9
    IS  - 3
    ER  - 

    Copy | Download

Author Information
  • Faculty of Science, Federal University Kashere, Gombe, Nigeria

  • Faculty of Science, Federal University Kashere, Gombe, Nigeria

  • Sections