A METHOD FOR USER AUTHENTICATING TO CRITICAL INFRASTRUCTURE OBJECTS BASED ON VOICE MESSAGE IDENTIFICATION

The subject of the research is the protection of critical infrastructure objects from unauthorized access based on voice message identification. The purpose of the research is to consider the main methods and algorithms for identifying an individual by voice, as well as the development of a software...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:Сучасні інформаційні системи Ročník 4; číslo 3; s. 11 - 16
Hlavní autoři: Trysnyuk, Vasyl, Nagornyi, Yevhen, Smetanin, Kirill, Humeniuk, Igor, Uvarova, Tetyana
Médium: Journal Article
Jazyk:angličtina
Vydáno: National Technical University "Kharkiv Polytechnic Institute" 05.10.2020
Témata:
ISSN:2522-9052
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract The subject of the research is the protection of critical infrastructure objects from unauthorized access based on voice message identification. The purpose of the research is to consider the main methods and algorithms for identifying an individual by voice, as well as the development of a software implementation of the restricted zone access control system, which allows improving the security of the standard password system by introducing voice authorization technologies and improving the algorithm for selecting voice fragments in audio files. Therefore, the purpose determines following tasks: analysis of the advantages and disadvantages of existing methods of information protection to infrastructure objects; determination of the optimal method of identification by voice message; a description of the main features of the implementation and use of Mel-frequency kastelnik coefficients (MFKC). Are used such methods: system approach, system analysis, theory of algorithms. The following results were obtained: an algorithm was developed for storing users ' voice data for further use in authorization, the voice authorization subsystem; the corresponding software of the computer system has been developed. Conclusions: based on the example of applying the biometric method of user authentication to critical infrastructure objects based on voice message identification, this method of user authentication should be used as an additional method of multi-factor authentication by entering an additional password or another method of biometric user authentication.
AbstractList The subject of the research is the protection of critical infrastructure objects from unauthorized access based on voice message identification. The purpose of the research is to consider the main methods and algorithms for identifying an individual by voice, as well as the development of a software implementation of the restricted zone access control system, which allows improving the security of the standard password system by introducing voice authorization technologies and improving the algorithm for selecting voice fragments in audio files. Therefore, the purpose determines following tasks: analysis of the advantages and disadvantages of existing methods of information protection to infrastructure objects; determination of the optimal method of identification by voice message; a description of the main features of the implementation and use of Mel-frequency kastelnik coefficients (MFKC). Are used such methods: system approach, system analysis, theory of algorithms. The following results were obtained: an algorithm was developed for storing users ' voice data for further use in authorization, the voice authorization subsystem; the corresponding software of the computer system has been developed. Conclusions: based on the example of applying the biometric method of user authentication to critical infrastructure objects based on voice message identification, this method of user authentication should be used as an additional method of multi-factor authentication by entering an additional password or another method of biometric user authentication.
Author Nagornyi, Yevhen
Smetanin, Kirill
Trysnyuk, Vasyl
Uvarova, Tetyana
Humeniuk, Igor
Author_xml – sequence: 1
  givenname: Vasyl
  surname: Trysnyuk
  fullname: Trysnyuk, Vasyl
– sequence: 2
  givenname: Yevhen
  surname: Nagornyi
  fullname: Nagornyi, Yevhen
– sequence: 3
  givenname: Kirill
  surname: Smetanin
  fullname: Smetanin, Kirill
– sequence: 4
  givenname: Igor
  surname: Humeniuk
  fullname: Humeniuk, Igor
– sequence: 5
  givenname: Tetyana
  surname: Uvarova
  fullname: Uvarova, Tetyana
BookMark eNo90EFvgjAYBuAeXDLn_Ac79A_gylda6BGxKIuDBMquTaVlwThZYJf9-4kunr687-FJvvcJzc792SH04pMVECGiV2AAniAMLhnIiq4IzND83j6i5TgeCSEgfPC5mKMuxu9S7YoNTosS15UscVyrncxVlsQqy7dYFTgpsynucZanZVypsk5UXUpcrN9koiq8jiu5wUWOP4oskRewquKtxNlmYtIrVOTP6KE1p9Et_-8C1alUyc7bF9sJ9xqfheA53nJjm4ZSYAfrmAgpoy2nRIAIDq6xxlIR0LYNnJu-CIgwjBwIpyLkDQe6QNnNtb056u-h-zLDr-5Np69FP3xqM_x0zclpC4Rz4Ax4YwMeRAYgtM62UUgMZzS6WMHNaoZ-HAfX3j2f6OvietpWT9vqaXFNNQH6B44KbN8
ContentType Journal Article
DBID AAYXX
CITATION
DOA
DOI 10.20998/2522-9052.2020.3.02
DatabaseName CrossRef
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
DatabaseTitleList
Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
DeliveryMethod fulltext_linktorsrc
EndPage 16
ExternalDocumentID oai_doaj_org_article_d206626526cd4648a227dedf870a6538
10_20998_2522_9052_2020_3_02
GroupedDBID AAYXX
ALMA_UNASSIGNED_HOLDINGS
CITATION
GROUPED_DOAJ
ID FETCH-LOGICAL-c1572-e6f6adcc3325bde597353f6309294becdad3943ff4ee2912409a50b063976c623
IEDL.DBID DOA
ISSN 2522-9052
IngestDate Fri Oct 03 12:51:08 EDT 2025
Sat Nov 29 02:13:06 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 3
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c1572-e6f6adcc3325bde597353f6309294becdad3943ff4ee2912409a50b063976c623
OpenAccessLink https://doaj.org/article/d206626526cd4648a227dedf870a6538
PageCount 6
ParticipantIDs doaj_primary_oai_doaj_org_article_d206626526cd4648a227dedf870a6538
crossref_primary_10_20998_2522_9052_2020_3_02
PublicationCentury 2000
PublicationDate 2020-10-05
PublicationDateYYYYMMDD 2020-10-05
PublicationDate_xml – month: 10
  year: 2020
  text: 2020-10-05
  day: 05
PublicationDecade 2020
PublicationTitle Сучасні інформаційні системи
PublicationYear 2020
Publisher National Technical University "Kharkiv Polytechnic Institute"
Publisher_xml – name: National Technical University "Kharkiv Polytechnic Institute"
SSID ssj0002912169
Score 2.120101
Snippet The subject of the research is the protection of critical infrastructure objects from unauthorized access based on voice message identification. The purpose of...
SourceID doaj
crossref
SourceType Open Website
Index Database
StartPage 11
SubjectTerms authentication by voice message
biometric identification
cyber security
identification by voice
information protection
unauthorized access
Title A METHOD FOR USER AUTHENTICATING TO CRITICAL INFRASTRUCTURE OBJECTS BASED ON VOICE MESSAGE IDENTIFICATION
URI https://doaj.org/article/d206626526cd4648a227dedf870a6538
Volume 4
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  issn: 2522-9052
  databaseCode: DOA
  dateStart: 20170101
  customDbUrl:
  isFulltext: true
  dateEnd: 99991231
  titleUrlDefault: https://www.doaj.org/
  omitProxy: false
  ssIdentifier: ssj0002912169
  providerName: Directory of Open Access Journals
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV07T8MwELYQYmBBIEC85YHVkPiVZCxtSitBgpoUsVmJ7UgsBfH6_dw5AXVjYbQVWdZ3Z_u72PcdIZdx0mmeuohJ7jImEytZ45RjkW7hOGlRQiyIuN4lRZE-PWUPa6W-8E1YLw_cA3ftUG-ca8W1dVLLtOE8cd514GeNhtWKuy-wnrVgCvdgnsU8DvXsOBAMlkWK93lzmCmaXv92QptD3Ho1_FX5OZfW5PvDOTPdJTsDQaSjfmJ7ZMOv9snziN7n9aycUAja6LLKFxQca5YXdUgELm5pXdLxYo7NOzovpotRVS-WY3zTQMtQ0qSiN6Mqn9CyoI_lfJzDgBVeJ9H5BIeZDhnFB2Q5zevxjA1FEpiNVcKZ151unLVCcNU6D_GBUKLTIgLeI8FArnEik6LrpPeICsRzjYracKGnLZCfQ7K5eln5I0K9jUUrvZDaJrLxQBVUyz1wBpsq3lp1TNgPROa118IwEEMESA1CahBSg5AaYSJ-TG4Qx99vUck6dIB9zWBf85d9T_5jkFOyjbMKj_DUGdn8ePv052TLfn08v79dBNf5BmTduDQ
linkProvider Directory of Open Access Journals
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+METHOD+FOR+USER+AUTHENTICATING+TO+CRITICAL+INFRASTRUCTURE+OBJECTS+BASED+ON+VOICE+MESSAGE+IDENTIFICATION&rft.jtitle=%D0%A1%D1%83%D1%87%D0%B0%D1%81%D0%BD%D1%96+%D1%96%D0%BD%D1%84%D0%BE%D1%80%D0%BC%D0%B0%D1%86%D1%96%D0%B9%D0%BD%D1%96+%D1%81%D0%B8%D1%81%D1%82%D0%B5%D0%BC%D0%B8&rft.au=Trysnyuk%2C+Vasyl&rft.au=Nagornyi%2C+Yevhen&rft.au=Smetanin%2C+Kirill&rft.au=Humeniuk%2C+Igor&rft.date=2020-10-05&rft.issn=2522-9052&rft.volume=4&rft.issue=3&rft.spage=11&rft.epage=16&rft_id=info:doi/10.20998%2F2522-9052.2020.3.02&rft.externalDBID=n%2Fa&rft.externalDocID=10_20998_2522_9052_2020_3_02
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2522-9052&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2522-9052&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2522-9052&client=summon