(2007) Case Study: Phone-based Voice Biometrics for Remote Authentication

41
Case Study Phone-based Voice Biometrics for Remote Authentication Stephen Elliot, Ph.D., Assoc Professor Purdue University & Andy Rolfe, VP of Development, Authentify Inc. 02/06/07 – ASEC-106

description

Identity verification and authentication (binding a human to an electronic transaction) have become strategic business issues. How does a voice biometric system perform for a typical remote authentication business scenario, and what conclusions can we make about the use of such a system?

Transcript of (2007) Case Study: Phone-based Voice Biometrics for Remote Authentication

Page 1: (2007) Case Study: Phone-based Voice Biometrics for Remote Authentication

Case StudyPhone-based Voice Biometrics

for Remote AuthenticationStephen Elliot, Ph.D., Assoc Professor

Purdue University&

Andy Rolfe, VP of Development, Authentify Inc.

02/06/07 – ASEC-106

Page 2: (2007) Case Study: Phone-based Voice Biometrics for Remote Authentication

Objective

• Objective: — Identity verification and authentication (binding a human

to an electronic transaction) have become strategic business issues. How does a voice biometric system perform for a typical remote authentication business scenario, and what conclusions can we make about the use of such a system?

Page 3: (2007) Case Study: Phone-based Voice Biometrics for Remote Authentication

©Th

e N

ew Y

orke

r Col

lect

ion

1993

Pet

er S

tein

er fr

om c

arto

onba

nk.c

om.

All

right

s res

erve

d.

… except Authentify

Page 4: (2007) Case Study: Phone-based Voice Biometrics for Remote Authentication

Overview

• Briefly giving you an overview of:— Biometric use in security systems

— The authentication best practices used

— The test methods

— Sample data

What we are NOT covering in presentation:— Voice biometric or signal processing technology (FFT, HMM, etc.)

— Making any statement about the applicability of the technology for your situation

Page 5: (2007) Case Study: Phone-based Voice Biometrics for Remote Authentication

Enrollment – Initial Screen

Page 6: (2007) Case Study: Phone-based Voice Biometrics for Remote Authentication

User Enters Registration Info

Page 7: (2007) Case Study: Phone-based Voice Biometrics for Remote Authentication

User Inputs Phone Number

Page 8: (2007) Case Study: Phone-based Voice Biometrics for Remote Authentication

The End User’s Phone Rings

Page 9: (2007) Case Study: Phone-based Voice Biometrics for Remote Authentication

The User Answers the Phone

Page 10: (2007) Case Study: Phone-based Voice Biometrics for Remote Authentication

The Authentication Process is Initiated

Page 11: (2007) Case Study: Phone-based Voice Biometrics for Remote Authentication

# Key Liveness Test

Page 12: (2007) Case Study: Phone-based Voice Biometrics for Remote Authentication

User Informed of Recordings

Page 13: (2007) Case Study: Phone-based Voice Biometrics for Remote Authentication

Please Speak Confirmation…

Page 14: (2007) Case Study: Phone-based Voice Biometrics for Remote Authentication

User Speaks Confirmation Number

Page 15: (2007) Case Study: Phone-based Voice Biometrics for Remote Authentication

Please Speak Phone Number…

Page 16: (2007) Case Study: Phone-based Voice Biometrics for Remote Authentication

User Speaks Telephone Number

Page 17: (2007) Case Study: Phone-based Voice Biometrics for Remote Authentication

Call Completed

Page 18: (2007) Case Study: Phone-based Voice Biometrics for Remote Authentication

Call Information from User

Page 19: (2007) Case Study: Phone-based Voice Biometrics for Remote Authentication

Biometrics in Security

• Biometrics primer:— Biometrics are by their nature statistically based

— Biometrics should not be the sole authenticator

— Backup methods for those that cannot (somehow impaired)

— Still have “first time” (registration) challenge

— Quality of implementation critical

• privacy,

• legal issues

• Multi-modal UI not easy

Page 20: (2007) Case Study: Phone-based Voice Biometrics for Remote Authentication

Voice Biometrics

• Why voice?— Familiar paradigm; Very user acceptable; “business like”

— Multi-factor authentication in one session

— Real-time, undeniable contact for remote authentication

— Highly auditable

— Out of band trusted network

— Both physiological and behavioral

— Variable, dynamic samples

— No hardware deployment or training

Page 21: (2007) Case Study: Phone-based Voice Biometrics for Remote Authentication

Ease of Use & Intrusiveness (previous study)

“I very much like the idea of voice identification. This process surpasses any other method of protecting my identity and SSN that I have seen. BRAVO!!

JoAnn W., Financial Advisory Firm

0.00%

10.00%

20.00%

30.00%

40.00%

50.00%

60.00%

70.00%

Not at allIntrusive

4 3 2 VeryIntrusive

0.00%

20.00%

40.00%

60.00%

80.00%

100.00%

Very Difficult Difficult Neutral Easy Very Easy

Page 22: (2007) Case Study: Phone-based Voice Biometrics for Remote Authentication

Security Best Practices

• Policies define process requirements— Policy will (should) reflect risk profile

— Policy must account for risk for each factor of authentication

— Policy will define which factors will (should) be used & when

• Collect and use as many factors as possible— Allows layering and substitution of factors depending on risks

• Fraudster may know everything about you, but does not mean they can answer your telephone

Page 23: (2007) Case Study: Phone-based Voice Biometrics for Remote Authentication

Purdue Study

• Why study?— No live system studies available

— Implementation specific

— Excellent resource nearby (Purdue University Biometrics Lab)

— Baseline for future studies

• biometric aging,

• technology changes,

• etc.

Page 24: (2007) Case Study: Phone-based Voice Biometrics for Remote Authentication

Biometric Comparisons

International Biometric Product Testing Initiative (May – Dec 2000) by National Physical Laboratory, England [ sponsored by the Communications Electronics Security Group (CESG) ]

Page 25: (2007) Case Study: Phone-based Voice Biometrics for Remote Authentication

System used for Study

• This biometric study utilized a commercially available, remote, service oriented security system.

• This system is actively being used by many corporations for mainly Internet commerce and financial applications at a rate of approximately 1.5M transactions per month.

• The test application was run using this active service environment to best test "real life" performance of the technology.

• Test system implementation:— SOA

— 2 step application• Registration• Verification

— Purdue University lab environment

Page 26: (2007) Case Study: Phone-based Voice Biometrics for Remote Authentication

Service Architecture

PBX

Users’ Web Session

WebServers Applet

Internet

Public Switched Telephone Network 555-333-2399( PSTN )

https XML

AuthentifyService Ctr.

Engage the user, their computer and their telephone in asynchronized exchange for a strong out-of-band authentication…

Bind theWeb sessionthe computer,the phone and the Person

CorporateWeb Site

EndUser

Page 27: (2007) Case Study: Phone-based Voice Biometrics for Remote Authentication

Roles & Responsibilities

• Authentify responsibilities:— Design and implementation of enrollment & verification voice applications

— Operation of the commercial service center in Chicago

• Joint responsibilities— Development of the test plan

— Data collection and reporting

— Data analysis and reports

• Purdue biometric lab responsibilities:— Recruitment and instruction of test subjects

— Acquisition, operation and maintenance of equipment used by test subjects

— Provide assistance to ensure proper testing procedures

Page 28: (2007) Case Study: Phone-based Voice Biometrics for Remote Authentication

• The Biometrics Lab at Purdue is designed for research, teaching, and testing

• Testing evaluation was approved by the Institutional Review Board at Purdue University

• This research is typical of the lab’s partnership with company’s focusing on “applied research”

• The lab is part of CERIAS

Biometrics Lab

Page 29: (2007) Case Study: Phone-based Voice Biometrics for Remote Authentication

Test Protocol

• Data was collected at the Purdue University Biometrics Standards, Performance, and Assurance Laboratory, in West Lafayette, Indiana.

• The experimental area consisted of a room with minimal ambient noise. — Noise that was present was predominantly voices of other people, as

the room was utilized for other purposes during the experiment.

— Since more than one individual could do the study at the same time and other individuals could be talking, noise conditions were collected during the study.

Page 30: (2007) Case Study: Phone-based Voice Biometrics for Remote Authentication

Phones & Network Providers

• The land-based phone was a Vodavi Starplus single line telephone. — Land line provided by the university

• The Vonage VoIP system utilized a Linksys phone adapter and Uniden 900 MHz cordless phone. — Network utilized was provided by the

university

— Network Speed 8,600 Kb/s upload / 86,000 Kb/s download

• The Skype VoIP system used a Linksys CIT200 Skype phone

• Cell phone services used:— T-Mobile

— Virgin Mobile

— Boost Mobile

— Tracphone

— Simple Freedom Wireless

Page 31: (2007) Case Study: Phone-based Voice Biometrics for Remote Authentication

Data Capture

• The biometric system consisted of:— Test subject web site where the sessions are initiated and the survey

results are captured

— Data capture enhancements to session processing

— Post processing of voice samples for more thorough test matrix coverage

• Used combined speech recognition and speaker verification

• Used text prompted verification method (dynamic version of text dependent verification)

• Did not use adaptation; did not test identification

Page 32: (2007) Case Study: Phone-based Voice Biometrics for Remote Authentication

Test Data

• Tests were automated to enable repeatable measurement of enrollment and verification rates, and to capture the following data:— Subject Identifier

— Trial Code (predetermined)

— Telephone Number

— Telephony Type (Landline, mobile, VoIP)

— Telephone Manufacturer & Model

— Telephone Location (address)

— Signal Strength (mobile phone only)

— Background Noise (Low | Med | High)

— Background Noise Type (Music | Speech | Noise)

— Subject’s Voice Health (Normal | Hoarse | Very Hoarse)

Page 33: (2007) Case Study: Phone-based Voice Biometrics for Remote Authentication

Data Analysis

• Data collection occurred in a indoor office environment— Conversational background noise

• The test sessions captured all data utilized, so no preexisting sample data was used.

• Enrollment templates and verification samples were compared bothin real-time and off-line after all test data had been collected.

• The combination of real-time sample capture and off-line comparison helps generate a wider range of performance data.

Page 34: (2007) Case Study: Phone-based Voice Biometrics for Remote Authentication

Authentify-Purdue Study ResultsSame Channel Performance -- Landline Verification vs. Landline Voiceprint

2.93% 3.61%

9.00%

1.47% 0.49% 0.49%0.00%

5.00%

10.00%

15.00%

20.00%

25.00%

30.00%

35.00%

40.00%

45.00%

50.00%

Low Med High

Security Level

Erro

r Rat

e

False Accept

False Reject

Land v Land

Page 35: (2007) Case Study: Phone-based Voice Biometrics for Remote Authentication

Authentify-Purdue Study ResultsSame Channel Performance -- Cell Verification vs Cell Voiceprint

3.26%

1.08%

12.87%

1.63%

2.63%

1.90%0.00%

5.00%

10.00%

15.00%

20.00%

25.00%

30.00%

35.00%

40.00%

45.00%

50.00%

Low Med High

Security Level

Erro

r Rat

e

False Accept

False Reject

Cell v Cell

Page 36: (2007) Case Study: Phone-based Voice Biometrics for Remote Authentication

Authentify-Purdue Study ResultsCross Channel Performance -- Cell Verification vs. Landline Voiceprint

0.00% 0.00% 0.00%

11.90% 11.94%

37.43%

0.00%

5.00%

10.00%

15.00%

20.00%

25.00%

30.00%

35.00%

40.00%

45.00%

50.00%

Low Med High

Security Level

Erro

r Rat

e

False Accept

False Reject

Cell v Land

Page 37: (2007) Case Study: Phone-based Voice Biometrics for Remote Authentication

Authentify-Purdue Study ResultsBatch: Landline Verification vs. Landline Voiceprint

7.10%

2.73%

1.64% 0.12%0.71%

3.05%

0.00%

5.00%

10.00%

15.00%

20.00%

25.00%

30.00%

35.00%

40.00%

45.00%

50.00%

Med-High High Very-High

Security Level

Erro

r Rat

e

False Reject

False Accept

Page 38: (2007) Case Study: Phone-based Voice Biometrics for Remote Authentication

Conclusions

• Dynamic sampling is an effective method of supporting multi-factor authentication in a single interaction

• Single voice biometric template capture OK for low to medium risk applications when layered

• Best to use phone number or channel specific templates for medium to high risk applications

• Use known phone number for verification to spawn new enrollment session on secondary device (e.g. use existing landline print toenroll on your new cell phone)

Page 39: (2007) Case Study: Phone-based Voice Biometrics for Remote Authentication

Conclusions

• We have got more work to do:— Qualify batch analysis procedures

— Cell phone connection quality; how to compensate?

— VoIP is worst. Why?

— How much do behavioral characteristics play a role? Do subject utterances change when they “know” they are acting as imposter?

— How well do biometric templates age? Use of adaptation?

— Can we leverage multiple verification engines to obtain a betterresult?

— What role do accents play? Do they only affect reco’, or biometric performance too?

Page 40: (2007) Case Study: Phone-based Voice Biometrics for Remote Authentication

Contact Information

Andrew Rolfe

V.P. of Development & Operations

Phone: 773-243-0339

Email: [email protected]

Authentify, Inc.

8745 W. Higgins Road, Suite 240

Chicago, Illinois, 60631

www.authentify.com

Stephen Elliott, Ph.D.

Associate Professor & Director of Biometric Standards, Performance, and Assurance Laboratory

Phone: 765-494-1088

Email: [email protected]

Purdue University

401 N. Grant Street

West Lafayette, IN, 47906

www.biotown.purdue.edu

Page 41: (2007) Case Study: Phone-based Voice Biometrics for Remote Authentication

Questions?

Authentify: Booth 803