Two Factor Authentication Based on Speech and an Index Password

C. Shobabindu*
Associate Professor, CSE Department, JNTUA College of Engineering, Anantapur, India.
Periodicity:March - May'2015
DOI : https://doi.org/10.26634/jit.4.2.3391

Abstract

Day-to-Day usage of internet is increasing for services like online shopping, online banking, email, etc., where authentication is necessary. Among the authentication techniques most commonly used are username and password. Using the password, an attacker can crack easily using guessing method. So, to strengthen authentication more than one factor is used. This paper proposes a two factor authentication scheme which uses the text dependent speaker verification system that speech as the first factor and text password as the second factor. During the login, the user utters the speech (passed as the first factor) and later, user is asked to give index value along with a sentence to form password (passes second factor). If both the factors are matched only then the user is authenticated and is allowed to access. The usability and performance analysis of the proposed TFA (Two Factor Authentication) is carried out using Morae Tool.

Keywords

TFA, Authentication, Passwords, Speech, Usability.

How to Cite this Article?

Shobabindu. C (2015). Two Factor Authentication Based on Speech and an Index Password. i-manager’s Journal on Information Technology, 4(2), 33-41. https://doi.org/10.26634/jit.4.2.3391

References

[1]. Pejman Mowalaee, Rahim saeidi, madsagrasboll, (2012). “A joint approach for single-channel speaker identification and speech separation”, IEEE Transactions on Audio, Speech and Language Processing, Vol. 20, No. 9, pp. 2586-2601.
[2]. Jain, A.K., Ross, A., Prabhakar, S., (2004). “An introduction to biometric recognition”, IEEE Transactions on Circuits and Systems for Video Technology Vol. 14, pp. 4–20.
[3]. Pawlewski, M., Jones, J., (2006). ”Speaker Verification Part 1”. Biometric Technology Today Vol. 14, No. 6, pp. 9–11.
[4]. Reddy, E., Babu, I, (2008). ” Performance of Iris Based Hard Fuzzy Vault. IJCSNS International Journal of Computer Science and Network Security Vol. 8, No. 1, pp. 297–304.
[5]. Imran Naseem, Ajmal Mian, (2008). “User Verification by Combining Speech and Face Biometrics in Video”, Advantages in Visual Computing, Vol. 5359, pp. 482-492.
[6]. Svetlana Segarceanu, Tiberius Zaharia, David Coffin and Bradley Morin (2013). “Speaker Verification using Dynamic Time Wrapping”, U.P.B. Sci.Bul., Series C, Vol. 75, No. 1, pp. 179-194 .
[7]. Jim Owens and Jeanna Matthews, (2008). ”A Study of Passwords and Methods Used in Brute-Force SSH Attacks", in USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEFT).
[8]. MudassarRaza, Muhammad Iqbal, Muhammad Sharif and WaqasHaider, (2012). ”A Survey of Password Attacks and Comparative Analysis on Methods for Secure Authentication” World Applied Sciences Journal Vol. 19, No. 4, pp. 439-444.
[9]. Divyajyoti, Jalandhar RamanKumar, (2014). “Security Analysis and Performance Evaluation of an Enhanced Two-Factor Authenticated Scheme”, International Journal of Computer Applications, Vol. 101, No. 8, pp. 218-222.
[10]. Roger Elrod, “Two-factor Authentication”, East Carolina University, 2005, July. http://www.123seminarsonly.com/Seminar- Reports /003/39183330-Two-Factor-Authentication.pdf.
[11]. Seddik, H.; Rahmouni, A.; Samadhi, M.; (2004). “Text independent speaker recognition using the Mel frequency cepstral coefficients and a neural network classifier” First International Symposium on Control, Communications and Signal Processing, Proceedings of IEEE, pp. 631 – 634.
[12]. Pradeep. Ch, (2007). ”Text Dependent Speaker Recognition Using MFCC and LBG VQ”, Master thesis, Department of Electronics & Communication Engineering, National Institute of Technology, Rourkela, 17 p.
[13]. VibhaTiwari, (2010). “MFCC and its applications in speaker recognition”, International Journal on Emerging Technologies Vol. 1, No. 1, pp. 19-22.
[14]. A. Srinivasan (2012). “Speaker Identification and Verification using Vector Quantization and Mel frequency Cepstral Coefficients”, Research Journal of Applied Sciences, Engineering and Technology Vol. 4, No. 1, pp. 33-40.
[15]. Andrew Teoh Ben, David Ngo ChekLng, AlwynGoh, (2004). “Biohashing: two factor authentication featuring fingerprint data and tokenized random number”, Journal of Pattern Recognition, Vol. 37, No. 11, pp. 2245-2255.
[16]. Kong Adams, King-Hong Cheung, David Zhang, Mohamed Kamel, Jane Joe, (2006). “ An analysis of BioHashing and its variants”, Vol. 39, No. 7, pp. 1359-1368.
[17]. Jassim, S.,Al-Assam, H.,Sellahewa, H., (2009). “Improving performance and security of biometrics using efficient and stable random projection techniques”, Proceedings of the 6th international Symposium on Image and Signal Processing and Analysis, pp. 556- 561.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.