Abstract
A system of authentication/authorization of users with administrative privileges was proposed. A mechanism for enhanced authentication and delegation of authority is proposed, which allows excluding the superuser by creating separate roles: network administrator, security administrator, virtual infrastructure administrator, APCS (automated process control system) administrator. The user authentication/authorization system is based on the use of the characteristics of the fourth formant and the frequency of the leading vowel formant.
Similar content being viewed by others
REFERENCES
Malyshev, E.V., Moskvin, D.A., and Zegzhda, D.P., Application of an artificial neural network for detection of attacks in VANETs, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 889–894. https://doi.org/10.3103/S0146411619080194
Zegzhda, P., Zegzhda, D., Pavlenko, E., and Ignatev, G., Applying deep learning techniques for Android malware detection, Proc. 11th Int. Conf. on Security of Information and Networks, Cardiff, UK, 2018, New York: Association for Computing Machinery, 2018, p. 7. https://doi.org/10.1145/3264437.3264476
Zegzhda, P.D., Malyshev, E.V., and Pavlenko, E.Yu., The use of an artificial neural network to detect automatically managed accounts in social networks, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 874–880. https://doi.org/10.3103/S0146411617080296
Belova, Ye.P. and Mashkina, I.V., Research results of artificial neural network for user authentication according to frequency of fourth formant of vowel sound phoneme, in Int. Russian Automation Conf. (RusAutoCon), Sochi, Russia, 2018, IEEE, 2018, pp. 1–6. https://doi.org/10.1109/RUSAUTOCON.2018.8501680
Rabiner, L.R. and Shafer, R.V., Tsifrovaya obrabotka rechevykh signalov (Digital Processing of Speech Signals), Moscow: Radio i Svyaz’, 1981.
Sidorenko, I.A. and Kuskova, P.A., On spectral analysis of phoneme using sound editors, Nauch. Ved. Belgorod. Gos. Univ. Ser.: Ekon. Inf., 2013, no. 22, pp. 246–250.
Mashkina, I.V. and Belova, E.P., Development of the biometric images neural network database for voice authentication system, Probl. Inf. Bezop. Komp’yut. Sist., 2019, no. 2, pp. 86–93.
Oganesyan, A.G., Effective algorithm for separating formants from the spectrum of speech signal, Izv. Nats. Akad. Nauk Resp. Arm. Gos. Inzh. Univ. Arm. Vychislit. Tekh. Inf., 2006, vol. 59, no. 1, pp. 177–183.
Kafarov, V.V., Gordeev, L.S., Glebov, M.B., and Jinbao, G., On the question of modeling and control of continuous technological processes using neural networks, TOKhT, 1995, vol. 29, no. 2, p. 205.
Privalov, M.V. and Kulibaba, O.V., Choice of features for authentication by voice in a computer access control system, Nauk. Pratsi Donetsk. Nats. Tekh. Univ. Ser.: Obchisl. Tekh. Avtom., 2010, no. 18, pp. 216–222.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
The authors declare that they have no conflicts of interest.
Additional information
Translated by S. Avodkova
About this article
Cite this article
Belova, E.P., Mashkina, I.V. Architecture and Operation Algorithm of a Biometric Voice Authentication System. Aut. Control Comp. Sci. 55, 924–931 (2021). https://doi.org/10.3103/S014641162108006X
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S014641162108006X