A METHOD FOR USER AUTHENTICATING TO CRITICAL INFRASTRUCTURE OBJECTS BASED ON VOICE MESSAGE IDENTIFICATION
The subject of the research is the protection of critical infrastructure objects from unauthorized access based on voice message identification. The purpose of the research is to consider the main methods and algorithms for identifying an individual by voice, as well as the development of a software...
Uloženo v:
| Vydáno v: | Сучасні інформаційні системи Ročník 4; číslo 3; s. 11 - 16 |
|---|---|
| Hlavní autoři: | , , , , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
National Technical University "Kharkiv Polytechnic Institute"
05.10.2020
|
| Témata: | |
| ISSN: | 2522-9052 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | The subject of the research is the protection of critical infrastructure objects from unauthorized access based on voice message identification. The purpose of the research is to consider the main methods and algorithms for identifying an individual by voice, as well as the development of a software implementation of the restricted zone access control system, which allows improving the security of the standard password system by introducing voice authorization technologies and improving the algorithm for selecting voice fragments in audio files. Therefore, the purpose determines following tasks: analysis of the advantages and disadvantages of existing methods of information protection to infrastructure objects; determination of the optimal method of identification by voice message; a description of the main features of the implementation and use of Mel-frequency kastelnik coefficients (MFKC). Are used such methods: system approach, system analysis, theory of algorithms. The following results were obtained: an algorithm was developed for storing users ' voice data for further use in authorization, the voice authorization subsystem; the corresponding software of the computer system has been developed. Conclusions: based on the example of applying the biometric method of user authentication to critical infrastructure objects based on voice message identification, this method of user authentication should be used as an additional method of multi-factor authentication by entering an additional password or another method of biometric user authentication. |
|---|---|
| AbstractList | The subject of the research is the protection of critical infrastructure objects from unauthorized access based on voice message identification. The purpose of the research is to consider the main methods and algorithms for identifying an individual by voice, as well as the development of a software implementation of the restricted zone access control system, which allows improving the security of the standard password system by introducing voice authorization technologies and improving the algorithm for selecting voice fragments in audio files. Therefore, the purpose determines following tasks: analysis of the advantages and disadvantages of existing methods of information protection to infrastructure objects; determination of the optimal method of identification by voice message; a description of the main features of the implementation and use of Mel-frequency kastelnik coefficients (MFKC). Are used such methods: system approach, system analysis, theory of algorithms. The following results were obtained: an algorithm was developed for storing users ' voice data for further use in authorization, the voice authorization subsystem; the corresponding software of the computer system has been developed. Conclusions: based on the example of applying the biometric method of user authentication to critical infrastructure objects based on voice message identification, this method of user authentication should be used as an additional method of multi-factor authentication by entering an additional password or another method of biometric user authentication. |
| Author | Nagornyi, Yevhen Smetanin, Kirill Trysnyuk, Vasyl Uvarova, Tetyana Humeniuk, Igor |
| Author_xml | – sequence: 1 givenname: Vasyl surname: Trysnyuk fullname: Trysnyuk, Vasyl – sequence: 2 givenname: Yevhen surname: Nagornyi fullname: Nagornyi, Yevhen – sequence: 3 givenname: Kirill surname: Smetanin fullname: Smetanin, Kirill – sequence: 4 givenname: Igor surname: Humeniuk fullname: Humeniuk, Igor – sequence: 5 givenname: Tetyana surname: Uvarova fullname: Uvarova, Tetyana |
| BookMark | eNo90EFvgjAYBuAeXDLn_Ac79A_gylda6BGxKIuDBMquTaVlwThZYJf9-4kunr687-FJvvcJzc792SH04pMVECGiV2AAniAMLhnIiq4IzND83j6i5TgeCSEgfPC5mKMuxu9S7YoNTosS15UscVyrncxVlsQqy7dYFTgpsynucZanZVypsk5UXUpcrN9koiq8jiu5wUWOP4oskRewquKtxNlmYtIrVOTP6KE1p9Et_-8C1alUyc7bF9sJ9xqfheA53nJjm4ZSYAfrmAgpoy2nRIAIDq6xxlIR0LYNnJu-CIgwjBwIpyLkDQe6QNnNtb056u-h-zLDr-5Np69FP3xqM_x0zclpC4Rz4Ax4YwMeRAYgtM62UUgMZzS6WMHNaoZ-HAfX3j2f6OvietpWT9vqaXFNNQH6B44KbN8 |
| ContentType | Journal Article |
| DBID | AAYXX CITATION DOA |
| DOI | 10.20998/2522-9052.2020.3.02 |
| DatabaseName | CrossRef DOAJ Directory of Open Access Journals |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website |
| DeliveryMethod | fulltext_linktorsrc |
| EndPage | 16 |
| ExternalDocumentID | oai_doaj_org_article_d206626526cd4648a227dedf870a6538 10_20998_2522_9052_2020_3_02 |
| GroupedDBID | AAYXX ALMA_UNASSIGNED_HOLDINGS CITATION GROUPED_DOAJ |
| ID | FETCH-LOGICAL-c1572-e6f6adcc3325bde597353f6309294becdad3943ff4ee2912409a50b063976c623 |
| IEDL.DBID | DOA |
| ISSN | 2522-9052 |
| IngestDate | Fri Oct 03 12:51:08 EDT 2025 Sat Nov 29 02:13:06 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 3 |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c1572-e6f6adcc3325bde597353f6309294becdad3943ff4ee2912409a50b063976c623 |
| OpenAccessLink | https://doaj.org/article/d206626526cd4648a227dedf870a6538 |
| PageCount | 6 |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_d206626526cd4648a227dedf870a6538 crossref_primary_10_20998_2522_9052_2020_3_02 |
| PublicationCentury | 2000 |
| PublicationDate | 2020-10-05 |
| PublicationDateYYYYMMDD | 2020-10-05 |
| PublicationDate_xml | – month: 10 year: 2020 text: 2020-10-05 day: 05 |
| PublicationDecade | 2020 |
| PublicationTitle | Сучасні інформаційні системи |
| PublicationYear | 2020 |
| Publisher | National Technical University "Kharkiv Polytechnic Institute" |
| Publisher_xml | – name: National Technical University "Kharkiv Polytechnic Institute" |
| SSID | ssj0002912169 |
| Score | 2.120101 |
| Snippet | The subject of the research is the protection of critical infrastructure objects from unauthorized access based on voice message identification. The purpose of... |
| SourceID | doaj crossref |
| SourceType | Open Website Index Database |
| StartPage | 11 |
| SubjectTerms | authentication by voice message biometric identification cyber security identification by voice information protection unauthorized access |
| Title | A METHOD FOR USER AUTHENTICATING TO CRITICAL INFRASTRUCTURE OBJECTS BASED ON VOICE MESSAGE IDENTIFICATION |
| URI | https://doaj.org/article/d206626526cd4648a227dedf870a6538 |
| Volume | 4 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals issn: 2522-9052 databaseCode: DOA dateStart: 20170101 customDbUrl: isFulltext: true dateEnd: 99991231 titleUrlDefault: https://www.doaj.org/ omitProxy: false ssIdentifier: ssj0002912169 providerName: Directory of Open Access Journals |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV07T8MwELYQYmBBIEC85YHVkPiVZCxtSitBgpoUsVmJ7UgsBfH6_dw5AXVjYbQVWdZ3Z_u72PcdIZdx0mmeuohJ7jImEytZ45RjkW7hOGlRQiyIuN4lRZE-PWUPa6W-8E1YLw_cA3ftUG-ca8W1dVLLtOE8cd514GeNhtWKuy-wnrVgCvdgnsU8DvXsOBAMlkWK93lzmCmaXv92QptD3Ho1_FX5OZfW5PvDOTPdJTsDQaSjfmJ7ZMOv9snziN7n9aycUAja6LLKFxQca5YXdUgELm5pXdLxYo7NOzovpotRVS-WY3zTQMtQ0qSiN6Mqn9CyoI_lfJzDgBVeJ9H5BIeZDhnFB2Q5zevxjA1FEpiNVcKZ151unLVCcNU6D_GBUKLTIgLeI8FArnEik6LrpPeICsRzjYracKGnLZCfQ7K5eln5I0K9jUUrvZDaJrLxQBVUyz1wBpsq3lp1TNgPROa118IwEEMESA1CahBSg5AaYSJ-TG4Qx99vUck6dIB9zWBf85d9T_5jkFOyjbMKj_DUGdn8ePv052TLfn08v79dBNf5BmTduDQ |
| linkProvider | Directory of Open Access Journals |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+METHOD+FOR+USER+AUTHENTICATING+TO+CRITICAL+INFRASTRUCTURE+OBJECTS+BASED+ON+VOICE+MESSAGE+IDENTIFICATION&rft.jtitle=%D0%A1%D1%83%D1%87%D0%B0%D1%81%D0%BD%D1%96+%D1%96%D0%BD%D1%84%D0%BE%D1%80%D0%BC%D0%B0%D1%86%D1%96%D0%B9%D0%BD%D1%96+%D1%81%D0%B8%D1%81%D1%82%D0%B5%D0%BC%D0%B8&rft.au=Trysnyuk%2C+Vasyl&rft.au=Nagornyi%2C+Yevhen&rft.au=Smetanin%2C+Kirill&rft.au=Humeniuk%2C+Igor&rft.date=2020-10-05&rft.issn=2522-9052&rft.volume=4&rft.issue=3&rft.spage=11&rft.epage=16&rft_id=info:doi/10.20998%2F2522-9052.2020.3.02&rft.externalDBID=n%2Fa&rft.externalDocID=10_20998_2522_9052_2020_3_02 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2522-9052&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2522-9052&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2522-9052&client=summon |