140
10.
Nizomiddin, Normatov. "TA’LIMDA DASTURLASH JARAYONINI
BAHOLASHGA ASOSLANGAN AVTOMATLASHTIRILGAN TIZIMNI TADBIQ
ETISH." International Journal of Contemporary Scientific and Technical Research
(2023): 24-28.
11.
Kamoliddin o‘g’li, Normatov Nizomiddin, and Ergashev Sirojiddin Baxtiyor
o‘g‘li. "ERWIN DASTURI YORDAMIDA IDEF0, IDEF3 VA DFD STANDAT
DIAGARAMMALARIDAN FOYDALANIB TIZIM SIFATIDA YARATILGAN
UNIVERSITETNING MONITORING BO ‘LIMI LOYIHASI." Новости
образования: исследование в XXI веке 1.6 (2023): 378-386.
12.
Javlon X. et al. Классификатор движения рук с использованием
биомиметического распознавания образов с помощью сверточных нейронных
сетей с методом динамического порога для извлечения движения с
использованием датчиков EF //Journal of new century innovations. – 2022. – Т. 19.
– №. 6. – С. 352-357.
13.
Қаршиев А. МАКТАБ ЮҚОРИ СИНФ ЎҚУВЧИСИНИГ АХБОРОТ
КОМПЕТЕНТЛИГИ ТУЗИЛМАСИ //Журнал математики и информатики. –
2020. – Т. 1. – №. 1.
14.
Қаршиев АА П. Ш. М. Глобаллашув жараёнида таълим сифатини
таъминлаш ва унинг ўзига хос хусусиятлари //Интернаука»: научный журнал. –
№. 44. – С. 126.
15.
Анарова, Шахзода, and Достон Мухторов. "ТИББИЙ ТУЗИЛИШЛИ
МУРАККАБ ОБЪЕКТЛАРНИНГ ФРАКТАЛ ЎЛЧОВЛАРНИ АНИҚЛАШ."
International Journal of Contemporary Scientific and Technical Research (2023): 196-
200.
THE ISSUE OF RECOGNIZING A PERSON BASED ON HIS VOICE
Dusanov Xurshid Toshpoʻlatovich
Jizzakh Branch of National University of Uzbekistan
Abstract.
Automated voice-based identification and authentication systems are
useful for many applications in national security, electoral integrity, cybercrime
prevention, and access control. Initially, traditional methods such as names, codes of
personal identification numbers, passwords were used for the use of biometric systems
in identification. Face, fingerprint, eye color and various other methods have been used
for personal identification. This article analyzes voice-based personal identification
systems and personal biometrics over the past five decades.
Keywords.
PIN, ID cards, DNA, automatic identity verification, automatic
identity identification, one-to-many.
Introduction
Personal identification is the process of recognizing an individual based on unique
characteristics, the most common method being name recognition. Early personal
141
identification technologies were developed based on secret knowledge (password and
personal identification number (PIN)).
There are two ways to identify an individual. These are biometric and non-
biometric identification. non-biometric methods include shared secret knowledge and
physical tokens. Secret knowledge is in the form of a PIN code, a password or an answer
to some secret question. physical tokens include keys, ID cards, security fobs, driver's
licenses and passports. Biometric identification is based on measuring the unique
characteristics of a certain person. As such features, fingerprints, eye color, DNA,
behavior, etc. can be used as unique features. In addition, a person's voice, his gait,
gestures, handwriting, etc., are also considered to be his own characteristics.
Unfortunately, in the traditional way, the password or PIN code can be forgotten
or even guessed. Tokens are commonly copied and stolen. In addition, tokens cannot
guarantee accurate identification of an individual.[1]
In contrast, biometric data is more secure against copying, tampering, alteration or
theft. Also, in terms of the intrinsic security of voice biometrics, a voice fingerprint is a
derivative code, it is not an audio recording, and speech cannot be reconstructed using
it. Even if a hacker was able to find it, the data could still appear as a string of
meaningless numbers that are functionally useless.
Review of related works
Identification of a person cannot be imagined without the biometric
characteristics of a person, because this type of recognition system has many
advantages. Biometrics is the science of measuring and analyzing human physiological
and social data [2]. A person's biometric characteristic refers to the measurement of all
his properties and characteristics (phenotype) or specific behavior [4]. These
characteristics are divided into statistical and dynamic types based on the physiological
characteristics that are common during a person's life. Statistical characteristics are
physical characteristics that are usually measured at a certain moment in time, which
are characteristic of a person from birth. Examples of these include fingerprints, pupils,
and the location of blood vessels. Dynamic characteristics are a sequence of actions
lasting a certain period of time, and these characteristics of a person are formed based
on the actions that he involuntarily performs in the course of performing certain actions.
Examples of dynamic features include signature, voice, and walking movements.
In general, the use of biometrics has emerged as the best way to identify an
individual because no two people have exactly the same biometric characteristics [3].
Biometric presence, based on the measurement of physical characteristics, uses
characteristics that are common and available to all categories of people. These features
are distinguishable, easily assembled and tested, and have high variability to replicate a
class of data.
In a voice-based recognition system, the characteristics of a person's voice are
based on the physical characteristics of their vocal tract, nasal cavities, and articulators
(including the mouth, lips, teeth, etc.) used to produce sound. These characteristics are
immutable to the individual, but behavioral characteristics may change over time
depending on age, location, medical conditions, or emotional state [4]. Voice-based
recognition methods are divided into two types: automatic identity verification (AIV)
and automatic identity identification (AII) system [4]. The limitations of conventional
142
personal identification systems have always been challenging, hence the need to explore
new biometric features using the most modern biometric technologies that can be
offered. Biometric technologies mean automatic or automated methods of recognizing
a person based on his biological or behavioral characteristics. Innate or slowly changing
features that are individual for each person, such as fingerprints, face shape, iris, voice,
handwriting, etc., can be used as biological markers. Review related cases.
A lot of research has been done on biometric technology for personal
identification. Biometric features fall into two main categories. The first category is
physiological characteristics based on what a person is, using data (features) obtained
as a result of direct measurement of parts of the human div (fingerprints, face, ear,
iris, hand geometry, finger veins, etc.) shown in Figure 1. The second category, which
is based on behavioral characteristics and actions of a person, uses information obtained
as a result of indirect measurement of a person's movement (voice recognition,
signature, gait, etc. shown in Figure 2 [5].
Figure 1 : Selected physiological biometrics in use [3]
Figure 2: selected behavioral biometrics in use [3]
A biometric authentication system can be classified as an identification or
verification system. An identification system is a one-to-many system in which
biometrics is used to recognize the identity of several individuals by comparing the
information stored in a database. For example, internal affairs may try to identify a
person's fingerprint or face from a forensic database. On the other hand, authentication
is a one-to-one identification system where biometric data is used to verify identity for
access control.[6]
Conclusion
Although biometric technology has some challenges, it is widely used in today's
information technology age. The choice of biometric type depends on the measurement
of features and user requirement. Other factors influencing the selection of a biometric
framework are sensor and device availability, computation time and reliability, cost,
sensor size, and power consumption. In addition, cultural bias is also a factor
influencing the choice of biometric technology.
143
Looking at the evolution of technology, moving from paper to electronics and
online medical databases to the banking and financial industry as well as social media.
Big and personal data must be adequately protected against hacking. However, a voice-
based recognition system is considered the perfect biometric for this task, given its
speed, efficiency and customer relations.
References:
1.
P. Korshunov and S. Marcel, “Joint operation of voice biometrics and
presentation attack detection,” 8th Int. Conf. Biometrics Theory, Appl. Syst. (BTAS),
ieeexplore.ieee.org, 2016.
2.
Raximov, N., Quvondikov, J., Dusanov, X., Daminova, B. As a mechanism
that achieves the goal of decision management. International Conference on
Information Science and Communications Technologies: Applications, Trends and
Opportunities, ICISCT 2021, 2021.
3.
N. Mamatov, X. Dusanov, G’. Pulatov Shaxsni ovozi asosida tanib olish
usullari. Raqamli transformatsiya va sun’iy intellekt ilmiy jurnali 2023/2. 90-95.
4.
R. B. Jadhao and A. Bakshi, “An Overview of Biometric System,” Int. J. Sci.
Res. Educ., vol. 3, no. 7, 2015.
5.
B. P. Salil and W. L. Damon, “Biometric authentication and identification
using keystroke dynamics: A survey,” J. Pattern Recognit. Res., vol. 7, no. 1, pp. 116–
139, 2012.
6.
J. Kaur and S. Kaur, “A Brief Review: Voice Biometric For Speaker
Verification in Attendance Systems,” Imp. J. Interdiscip. Res., vol. 2, no. 10, 2016.
7.
Maxamadaliyevich S. B. YER TUZISH LOYIHALARIDA GEOAXBOROT
TEXNOLOGIYALARINING AGROLANDSHAFT ASOSLARI //International
Journal of Contemporary Scientific and Technical Research. – 2022. – С. 197-200.
8.
Akhatov A., Saidaliyev B., Quvondikov J. Simulation modeling for
optimizing the crops structure in the conditions of the Jizzakh region //2021
International Conference on Information Science and Communications Technologies
(ICISCT). – IEEE, 2021. – С. 1-4.
9.
Ахатов А., Сайдалиев Б. Qishloq xoʻjalik ekinlarining avtomatlashgan
tasnifini yaratishda yuqori aniqlikdagi kosmik tasvir materiallarini qo'llanish tajribasi
//Современные инновационные исследования актуальные проблемы и развитие
тенденции: решения и перспективы. – 2022. – Т. 1. – №. 1. – С. 144-146.
VIDEOKUZATUV VOSITALARI AXBOROTLARIGA RAQAMLI ISHLOV
BERISH DASTURIY VOSITALARINING YARATILISH BOSQICHLARI
(PhD), Umarov Xasan Abdullayevich
O‘zbekiston Milliy universiteti Jizzax filiali
Rahimov Nodirbek Orziqul o‘g‘li
O‘zbekiston Milliy universiteti Jizzax filiali magistranti
Annotatsiya
: Xavfsizlikni ta’minlash bugungi kunning eng dolzarb
masalalaridan hisoblanadi. Shuning uchun videokuzatuv vositalari orqali olingan