Multi-factor authentication model based on multipurpose speech watermarking and online speaker recognition

In this paper, a Multi-Factor Authentication (MFA) method is developed by a combination of Personal Identification Number (PIN), One Time Password (OTP), and speaker biometric through the speech watermarks. For this reason, a multipurpose digital speech watermarking applied to embed semi-fragile and robust watermarks simultaneously in the speech signal, respectively to provide tamper detection and proof of ownership. Similarly, the blind semi-fragile speech watermarking technique, Discrete Wavelet Packet Transform (DWPT) and Quantization Index Modulation (QIM) are used to embed the watermark in an angle of the wavelet’s sub-bands where more speaker specific information is available. For copyright protection of the speech, a blind and robust speech watermarking are used by applying DWPT and multiplication. Where less speaker specific information is available the robust watermark is embedded through manipulating the amplitude of the wavelet’s sub-bands. Experimental results on TIMIT, MIT, and MOBIO demonstrate that there is a trade-off among recognition performance of speaker recognition systems, robustness, and capacity which are presented by various triangles. Furthermore, threat model and attack analysis are used to evaluate the feasibility of the developed MFA model. Accordingly, the developed MFA model is able to enhance the security of the systems against spoofing and communication attacks while improving the recognition performance via solving problems and overcoming limitations.

[1]  Andreas Uhl,et al.  Two-Factor Biometric Recognition with Integrated Tamper-Protection Watermarking , 2011, Communications and Multimedia Security.

[2]  Fathi E. Abd El-Samie,et al.  An SVD audio watermarking approach using chaotic encrypted images , 2011, Digit. Signal Process..

[3]  Jianwu Dang,et al.  An investigation of dependencies between frequency components and speaker characteristics based on phoneme mean F-ratio contribution , 2012, Proceedings of The 2012 Asia Pacific Signal and Information Processing Association Annual Summit and Conference.

[4]  Marcos Faúndez-Zanuy,et al.  Speaker verification security improvement by means of speech watermarking , 2006, Speech Commun..

[5]  Sourav Mukhopadhyay,et al.  Improved Biometric-Based Three-factor Remote User Authentication Scheme with Key Agreement Using Smart Card , 2013, ICISS.

[6]  D. Hinkley On the ratio of two correlated normal random variables , 1969 .

[7]  Matti Pietikäinen,et al.  Bi-Modal Person Recognition on a Mobile Phone: Using Mobile Phone Data , 2012, 2012 IEEE International Conference on Multimedia and Expo Workshops.

[8]  Douglas A. Reynolds,et al.  Speaker Verification Using Adapted Gaussian Mixture Models , 2000, Digit. Signal Process..

[9]  Jean-François Bonastre,et al.  Localization and selection of speaker-specific information with statistical modeling , 2000, Speech Commun..

[10]  Scott Craver,et al.  Additive attacks on speaker recognition , 2014, Electronic Imaging.

[11]  Douglas A. Reynolds,et al.  Speaker identification and verification using Gaussian mixture speaker models , 1995, Speech Commun..

[12]  Larry P. Heck,et al.  MSR Identity Toolbox v1.0: A MATLAB Toolbox for Speaker Recognition Research , 2013 .

[13]  Farrokh Marvasti,et al.  Robust Multiplicative Audio and Speech Watermarking Using Statistical Modeling , 2009, 2009 IEEE International Conference on Communications.

[14]  Carla Teixeira Lopes,et al.  TIMIT Acoustic-Phonetic Continuous Speech Corpus , 2012 .

[15]  Farrokh Marvasti,et al.  Robust audio and speech watermarking using Gaussian and Laplacian modeling , 2010, Signal Process..

[16]  Douglas A. Reynolds,et al.  A Tutorial on Text-Independent Speaker Verification , 2004, EURASIP J. Adv. Signal Process..

[17]  Husrev T. Sencar,et al.  Security issues in watermarking applications - a deeper look , 2006, MCPS '06.

[18]  Hoon-Jae Lee,et al.  Multi-Factor Authentication Process Using More than One Token with Watermark Security , 2013 .

[19]  Patrick Kenny,et al.  Front-End Factor Analysis for Speaker Verification , 2011, IEEE Transactions on Audio, Speech, and Language Processing.

[20]  Chun-Ta Li,et al.  An efficient biometrics-based remote user authentication scheme using smart cards , 2010, J. Netw. Comput. Appl..

[21]  L. O'Gorman,et al.  Comparing passwords, tokens, and biometrics for user authentication , 2003, Proceedings of the IEEE.

[22]  Seng-Phil Hong,et al.  A Method of Risk Assessment for Multi-Factor Authentication , 2011, J. Inf. Process. Syst..

[23]  Syed Abdul Rahman Al-Haddad,et al.  Distant Speaker Recognition: An Overview , 2016, Int. J. Humanoid Robotics.

[24]  Syed Abdul Rahman Al-Haddad,et al.  Semi-fragile digital speech watermarking for online speaker recognition , 2015, EURASIP J. Audio Speech Music. Process..

[25]  Jianwu Dang,et al.  An investigation of dependencies between frequency components and speaker characteristics for text-independent speaker identification , 2008, Speech Commun..

[26]  Chris Roberts,et al.  Biometric attack vectors and defences , 2007, Comput. Secur..

[27]  Alex Park,et al.  The MIT Mobile Device Speaker Verification Corpus: Data Collection and Preliminary Experiments , 2006, 2006 IEEE Odyssey - The Speaker and Language Recognition Workshop.

[28]  Syed Abdul Rahman Al-Haddad,et al.  Robust Digital Speech Watermarking For Online Speaker Recognition , 2015 .

[29]  Mikhail Khitrov,et al.  Talking passwords: voice biometrics for data access and security , 2013 .

[30]  Bhiksha Raj,et al.  Privacy-Preserving Speaker Verification and Identification Using Gaussian Mixture Models , 2013, IEEE Transactions on Audio, Speech, and Language Processing.

[31]  Stphane Mallat,et al.  A Wavelet Tour of Signal Processing, Third Edition: The Sparse Way , 2008 .

[32]  S. Mallat A wavelet tour of signal processing , 1998 .

[33]  Haizhou Li,et al.  Spoofing and countermeasures for speaker verification: A survey , 2015, Speech Commun..

[34]  Jonathan G. Fiscus,et al.  Darpa Timit Acoustic-Phonetic Continuous Speech Corpus CD-ROM {TIMIT} | NIST , 1993 .

[35]  Gernot Kubin,et al.  Speaker identification security improvement by means of speech watermarking , 2007, Pattern Recognit..

[36]  Stéphane Mallat,et al.  A Wavelet Tour of Signal Processing - The Sparse Way, 3rd Edition , 2008 .