CASPIAN JOURNAL

MANAGEMENT AND HIGH TECHNOLOGIES

PROTECTION METHODS IN MODERN VOICE AUTHENTICATION SYSTEMS

Read Evsyukov Michael V., Putyato Michael M., Makaryan Alexander S., Nemchinova Valeriya O. PROTECTION METHODS IN MODERN VOICE AUTHENTICATION SYSTEMS // Caspian journal : management and high technologies. — 2022. — №3. — pp. 84-92.

Evsyukov Michael V. - Kuban State Technological University

Putyato Michael M. - Kuban State Technological University

Makaryan Alexander S. - Kuban State Technological University

Nemchinova Valeriya O. - Kuban State Technological University

The problem of improving the security of voice authentication systems is becoming increasingly important due to the rapid development and widespread use of voice interfaces. Although voice recognition algorithms are wellstudied and demonstrate high reliability when tested by live people, modern voice authentication systems are subject to a number of vulnerabilities. First of all, this is due to the access to affordable and high-quality devices for recording and playing sound. This fact provides attackers with powerful tools to implement attacks on voice authentication systems. As a rule, the attacker's purpose is to authenticate in the system under the guise of another person. Actions aimed at achieving this goal are called spoofing. This article describes the main voice characteristics used in the implementation of voice authentication systems, provides an up-to-date classification of voice recognition algorithms, describes existing metrics for evaluating the effectiveness of voice authentication systems, and outlines existing approaches to classifying spoofing methods. In addition, the classification of countermeasures against spoofing has been improved and promising directions for future research in the field of voice authentication have been identified.

Key words: biometrics, artificial intelligence, machine learning, information security, authentication, spoofing, liveness detection