Speech and text recognition system: A tool for authentication based on random read
Descripción del Articulo
The main objective of this paper is the development of a speech and text recognition system to improve security in user identification. For the development of the system, deep learning methodologies and several Python libraries were implemented, including Speech_recognition, Pyttsx3, and Librosa, am...
Autores: | , , , |
---|---|
Formato: | artículo |
Fecha de Publicación: | 2024 |
Institución: | Universidad La Salle |
Repositorio: | Revistas - Universidad La Salle |
Lenguaje: | español |
OAI Identifier: | oai:ojs.revistas.ulasalle.edu.pe:article/180 |
Enlace del recurso: | https://revistas.ulasalle.edu.pe/innosoft/article/view/180 https://doi.org/10.48168/innosoft.s16.a180 https://purl.org/42411/s16/a180 https://n2t.net/ark:/42411/s16/a180 |
Nivel de acceso: | acceso abierto |
Materia: | authentication biometrics voice recognition computer security autenticación biometría reconocimiento de voz seguridad informática |
Sumario: | The main objective of this paper is the development of a speech and text recognition system to improve security in user identification. For the development of the system, deep learning methodologies and several Python libraries were implemented, including Speech_recognition, Pyttsx3, and Librosa, among others. The system was evaluated in a controlled environment using 50 speech samples, obtaining an accuracy of 74%. The results indicated that 61.53% of the errors were due to failures in voice identification and 30.76% were due to discrepancies in matching the generated text. These findings underscore the overall effectiveness of the system, although they also point to the need to adjust the similarity thresholds and improve the recognition algorithms to increase their accuracy and robustness. It is concluded that the system presents a promising solution for biometric voice authentication, showing a balance between accuracy and areas for improvement that reinforce its usefulness in computer security applications. |
---|
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).