An Optimized and Privacy-Preserving System Architecture for Effective Voice Authentication over Wireless Network
Aniruddha Deka1, Debashis Dev Misra2
1Dr. Aniruddha Deka, Associate Professor, Department of Computer Science and Engineering, Assam Down Town University, Guwahati (Assam), India.
2Dr. Debashis Dev Misra, Associate Professor, Department of Computer Science and Engineering, Assam Down Town University, Guwahati (Assam), India.
Manuscript received on 13 July 2023 | Revised Manuscript received on 18 July 2023 | Manuscript Accepted on 15 September 2023 | Manuscript published on 30 September 2023 | PP: 1-9 | Volume-12 Issue-3, September 2023 | Retrieval Number: 100.1/ijrte.C78620912323 | DOI: 10.35940/ijrte.C7862.0912323
Open Access | Editorial and Publishing Policies | Cite | Zenodo | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: The speaker authentication systems assist in determining the identity of speaker in audio through distinctive voice characteristics. Accurate speaker authentication over wireless network is becoming more challenging due to phishing assaults over the network. There have been constructed multiple kinds of speech authentication models to employ in multiple applications where voice authentication is a primary focus for user identity verification. However, explored voice authentication models have some limitations related to accuracy and phishing assaults in real-time over wireless network. In research, optimized and privacy-preserving system architecture for effective speaker authentication over a wireless network has been proposed to accurately identify the speaker voice in real-time and prevent phishing assaults over network in more accurate manner. The proposed system achieved very good performance metrics measured accuracy, precision, and recall and the F1 score of the proposed model were98.91%, 96.43%, 95.37%, and 97.99%, respectively. The measured training losses on the epoch 0, 10, 20, 30, 40, 50, 60, 70, 80, 90, and 100 were 2.4, 2.1, 1.8, 1.5, 1.2, 0.9, 0.6, 0.3, 0.3, 0.3, and 0.2, respectively. Also, the measured testing losses on the epoch of 0, 10, 20, 30, 40, 50, 60, 70, 80, 90, and 100 were 2.2, 2, 1.5, 1.4, 1.1, 0.8, 0.8, 0.7, 0.4, 0.1 and 0.1, respectively. Voice authentication over wireless networks is serious issue due to various phishing attacks and inaccuracy in voice identification. Therefore, this requires huge attention for further research in this field to develop less computationally complex speech authentication systems.
Keywords: CNN, LSTM, Speaker Authentication, Privacy-Preserving, Phishing Assaults, Wireless Network.
Scope of the Article: Network Protocols & Wireless Networks